Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
442.docx.exe

Overview

General Information

Sample name:442.docx.exe
renamed because original name is a hash value
Original sample name: .docx.exe
Analysis ID:1567328
MD5:fb8117b1a3f0924100fbc209dbbb1bb1
SHA1:9d18c954eae8e8f8437d4e32d0b685f3f51b982b
SHA256:beaa1498a67bab02bc4c08f00bde36489aaa86ad8b01ee70b477452a08d360ec
Infos:

Detection

RMSRemoteAdmin
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected RMS RemoteAdmin tool
Yara signature match

Classification

  • System is w10x64
  • 442.docx.exe (PID: 7480 cmdline: "C:\Users\user\Desktop\442.docx.exe" MD5: FB8117B1A3F0924100FBC209DBBB1BB1)
    • msiexec.exe (PID: 7584 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\intel\Word.msi" /qn MD5: E5DA170027542E25EDE42FC54C929077)
    • WINWORD.EXE (PID: 7656 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\intel\Doc.docx" /o "" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
  • msiexec.exe (PID: 7620 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7736 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 3A7D5E944AD6C6FD24895B2767E40451 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • rfusclient.exe (PID: 1900 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" -msi_copy "C:\intel\Word.msi" MD5: CB9BE257064162076EBD4869CD97E166)
    • rutserv.exe (PID: 2200 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall MD5: D563A4D6BFCFE6884D1AC88824CB5C2A)
    • rutserv.exe (PID: 7512 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall MD5: D563A4D6BFCFE6884D1AC88824CB5C2A)
    • rutserv.exe (PID: 7212 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /start MD5: D563A4D6BFCFE6884D1AC88824CB5C2A)
  • svchost.exe (PID: 7888 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • rutserv.exe (PID: 7796 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -service MD5: D563A4D6BFCFE6884D1AC88824CB5C2A)
    • rfusclient.exe (PID: 8092 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" MD5: CB9BE257064162076EBD4869CD97E166)
      • rfusclient.exe (PID: 7540 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray MD5: CB9BE257064162076EBD4869CD97E166)
    • rfusclient.exe (PID: 8140 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray MD5: CB9BE257064162076EBD4869CD97E166)
    • rutserv.exe (PID: 6104 cmdline: "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall MD5: D563A4D6BFCFE6884D1AC88824CB5C2A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
    C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMALWARE_Win_RemoteUtilitiesRATRemoteUtilitiesRAT RAT payloadditekSHen
    • 0x3a1d58:$s1: rman_message
    • 0x453340:$s3: rms_host_
    • 0x453cf8:$s3: rms_host_
    • 0x816eb4:$s4: rman_av_capture_settings
    • 0x45a4c4:$s7: _rms_log.txt
    • 0x4bf3c8:$s8: rms_internet_id_settings
    C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
      C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMALWARE_Win_RemoteUtilitiesRATRemoteUtilitiesRAT RAT payloadditekSHen
      • 0x39e594:$s1: rman_message
      • 0x46d594:$s3: rms_host_
      • 0x46df4c:$s3: rms_host_
      • 0x82acb0:$s4: rman_av_capture_settings
      • 0x877858:$s5: rman_registry_key
      • 0x8778a4:$s5: rman_registry_key
      • 0x543d6c:$s6: rms_system_information
      • 0x2f1a18:$s7: _rms_log.txt
      • 0x503238:$s8: rms_internet_id_settings
      SourceRuleDescriptionAuthorStrings
      00000012.00000002.3573808248.000000000314A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
        00000012.00000002.3573808248.0000000003118000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
          00000011.00000002.3572801729.00000000017DA000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
            00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
              00000012.00000002.3579027400.0000000004B64000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
                Click to see the 8 entries
                SourceRuleDescriptionAuthorStrings
                9.0.rfusclient.exe.310000.0.unpackJoeSecurity_RMSRemoteAdminYara detected RMS RemoteAdmin toolJoe Security
                  9.0.rfusclient.exe.310000.0.unpackMALWARE_Win_RemoteUtilitiesRATRemoteUtilitiesRAT RAT payloadditekSHen
                  • 0x3a1d58:$s1: rman_message
                  • 0x453340:$s3: rms_host_
                  • 0x453cf8:$s3: rms_host_
                  • 0x816eb4:$s4: rman_av_capture_settings
                  • 0x45a4c4:$s7: _rms_log.txt
                  • 0x4bf3c8:$s8: rms_internet_id_settings

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\442.docx.exe", CommandLine: "C:\Users\user\Desktop\442.docx.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\442.docx.exe, NewProcessName: C:\Users\user\Desktop\442.docx.exe, OriginalFileName: C:\Users\user\Desktop\442.docx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\442.docx.exe", ProcessId: 7480, ProcessName: 442.docx.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 111.90.147.125, DestinationIsIpv6: false, DestinationPort: 465, EventID: 3, Image: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, Initiated: true, ProcessId: 7796, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49870
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7888, ProcessName: svchost.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-03T12:48:20.628368+010028493541Malware Command and Control Activity Detected192.168.2.449873111.90.147.12580TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD245A0 rmsEncInitSimpleEncryption,memcpy,memcpy,9_2_5FD245A0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD23760 rmsEncEncryptData,9_2_5FD23760
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD23D30 rmsEncRsaPrivateDecrypt,memcpy,memcpy,memcpy,9_2_5FD23D30
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD242D0 rmsEncRsaPrivateEncrypt,memcpy,memcpy,memcpy,9_2_5FD242D0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD238C0 rmsEncDecryptData,9_2_5FD238C0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD23AE0 rmsEncRsaPublicEncrypt,memcpy,9_2_5FD23AE0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FD24000 rmsEncRsaPublicDecrypt,memcpy,memcpy,memcpy,9_2_5FD24000
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_09749e9a-1

                  Compliance

                  barindex
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeUnpacked PE file: 9.2.rfusclient.exe.310000.0.unpack
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\ProgramData\Remote Manipulator System\install.log
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\EULA.rtfJump to behavior
                  Source: 442.docx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 442.docx.exe, 00000000.00000000.1710698957.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmp, 442.docx.exe, 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmp
                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened: c:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6B40BC
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6CB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6CB190
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6DFCA0 FindFirstFileExA,0_2_00007FF7ED6DFCA0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 4x nop then push esi9_2_600E6B90
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 4x nop then sub esp, 1Ch9_2_600EBEB0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 4x nop then push esi9_2_600E6AD0
                  Source: winword.exeMemory has grown: Private usage: 4MB later: 92MB

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2849354 - Severity 1 - ETPRO MALWARE Remote Admin Backdoor Related Activity : 192.168.2.4:49873 -> 111.90.147.125:80
                  Source: global trafficTCP traffic: 111.90.147.125 ports 5651,465,4,5,6,55555,80
                  Source: global trafficTCP traffic: 192.168.2.4:49806 -> 95.213.205.83:5655
                  Source: global trafficTCP traffic: 192.168.2.4:49809 -> 109.234.156.179:5655
                  Source: global trafficTCP traffic: 192.168.2.4:49871 -> 111.90.147.125:5651
                  Source: global trafficTCP traffic: 192.168.2.4:49874 -> 78.138.9.142:5651
                  Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.138.9.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.234.156.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.147.125
                  Source: global trafficDNS traffic detected: DNS query: id72.internetid.ru
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024C8000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0V
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crlB)
                  Source: rutserv.exe, 00000010.00000003.2572074671.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2095413447.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crlF.
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crlP)
                  Source: rutserv.exe, 00000010.00000003.1960578808.0000000002566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crlu
                  Source: rutserv.exe, 00000010.00000003.2572074671.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2095413447.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl0
                  Source: rutserv.exe, 00000010.00000003.2572074671.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2095413447.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl:UV
                  Source: rutserv.exe, 00000010.00000003.2572074671.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2095413447.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crlXW
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                  Source: svchost.exe, 00000005.00000002.3419566312.000001C99D400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024C8000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D658000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D68D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D6D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: rfusclient.exe, 00000009.00000000.1816392501.000000000035F000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1929061008.000000007B5F0000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1939132075.000000007CAC0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://madExcept.comU
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024C8000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3603820083.00000000044F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/
                  Source: rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/R
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr45
                  Source: rutserv.exe, 00000010.00000003.1960578808.0000000002566000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6N
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr456)
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr458.0
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr45T.
                  Source: rutserv.exe, 00000010.00000003.1960914551.0000000002556000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr45Z.
                  Source: rutserv.exe, 00000010.00000003.1960578808.0000000002566000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965487513.0000000002568000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr45zF
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020
                  Source: rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965487513.0000000002577000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965487513.000000000256F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBTLuA3ygnKW%2F7xuSx%2
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca20200V
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020P)
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020T.
                  Source: rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020Z.
                  Source: rutserv.exe, 00000010.00000002.3577310653.0000000002561000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2572074671.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2095413447.0000000002559000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965746877.0000000002559000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca2020http://crl.globalsign.com/gsgccr45codesignca2020.cr
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                  Source: rutserv.exe, 00000010.00000002.3574164629.0000000002498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/rootr31.3.6.1.5.5.7.48.2http://secure.globalsign.com/cacert/root-r3.crtE
                  Source: rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/rootr3http://crl.globalsign.com/root-r3.crlk
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru///rmansys.ru/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru///rmansys.ru/;
                  Source: rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000002.3604652724.000000000482F000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/internet-id/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/nsys.ru/pf
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/pf
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/rd
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/web-help/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/web-help/eb-help/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://rmansys.ru/web-help/eb-help/D
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: svchost.exe, 00000005.00000003.3118282077.000001C9980B1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3419150789.000001C9980B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.dm
                  Source: rfusclient.exe, 00000009.00000000.1816392501.000000000035F000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1929061008.000000007B5F0000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1939132075.000000007CAC0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmpString found in binary or memory: http://update.tektonit.ru/upgrade.ini
                  Source: rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmpString found in binary or memory: http://update.tektonit.ru/upgrade_beta.ini
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.flexerasoftware.com0
                  Source: rfusclient.exe, 00000009.00000003.1836674180.0000000003005000.00000004.00001000.00020000.00000000.sdmp, rfusclient.exe, 00000009.00000000.1816392501.0000000000B6B000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000001221000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 0000000A.00000003.1880620859.0000000003F75000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 0000000C.00000003.1911028682.0000000003F85000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 0000000F.00000003.1939737722.0000000003F05000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.inkscape.org/namespaces/inkscape
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: rutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
                  Source: rutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
                  Source: rfusclient.exe, 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmp, rutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D73F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D6E3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D728000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D747000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                  Source: rutserv.exe, 0000000A.00000002.1895252133.000000006028F000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://gcc.gnu.org/bugsrg/bugs/):
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                  Source: svchost.exe, 00000005.00000003.1765637227.000001C99D696000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB591000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rmansys.ru/IS_PREVENT_DOWNGRADE_EXITZ_DOWNGRADE_DETECTED;Z_UPGRADE_DETECTED;COMPANYNAME;INST
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://rmansys.ru/remote-access/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://rmansys.ru/remote-access//rmansys.ru/remote-access/
                  Source: rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://rmansys.ru/remote-access//rmansys.ru/remote-access/O
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.remoteutilities.com/about/privacy-policy.php
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.remoteutilities.com/buy/money-back-guarantee.php
                  Source: rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.remoteutilities.com/support/docs/installing-and-uninstalling/
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A1D627669EFC8CD4F21BCF387D97F9B5_E818918BC57803438E0E0146A88425A7Jump to dropped file
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_6C354C532D063DF5607A63BA827F5164Jump to dropped file
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41CJump to dropped file

                  System Summary

                  barindex
                  Source: 9.0.rfusclient.exe.310000.0.unpack, type: UNPACKEDPEMatched rule: RemoteUtilitiesRAT RAT payload Author: ditekSHen
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, type: DROPPEDMatched rule: RemoteUtilitiesRAT RAT payload Author: ditekSHen
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, type: DROPPEDMatched rule: RemoteUtilitiesRAT RAT payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6AC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6AC2F0
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\440b40.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF85.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{77817ADF-D5EC-49C6-B987-6169BBD5345B}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI10DE.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\440b43.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\440b43.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\ARPPRODUCTICON.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_start_C00864331B9D4391A8A26292A601EBE2.exeJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41C
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41C
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_6C354C532D063DF5607A63BA827F5164
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_6C354C532D063DF5607A63BA827F5164
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A1D627669EFC8CD4F21BCF387D97F9B5_E818918BC57803438E0E0146A88425A7
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A1D627669EFC8CD4F21BCF387D97F9B5_E818918BC57803438E0E0146A88425A7
                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIF85.tmpJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6CCE880_2_00007FF7ED6CCE88
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6A5E240_2_00007FF7ED6A5E24
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C1F200_2_00007FF7ED6C1F20
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6AF9300_2_00007FF7ED6AF930
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B49280_2_00007FF7ED6B4928
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D07540_2_00007FF7ED6D0754
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6CB1900_2_00007FF7ED6CB190
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C34840_2_00007FF7ED6C3484
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BA4AC0_2_00007FF7ED6BA4AC
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C2D580_2_00007FF7ED6C2D58
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C8DF40_2_00007FF7ED6C8DF4
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D07540_2_00007FF7ED6D0754
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E20800_2_00007FF7ED6E2080
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BAF180_2_00007FF7ED6BAF18
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6DFA940_2_00007FF7ED6DFA94
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B1A480_2_00007FF7ED6B1A48
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E5AF80_2_00007FF7ED6E5AF8
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C2AB00_2_00007FF7ED6C2AB0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6A1AA40_2_00007FF7ED6A1AA4
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BC96C0_2_00007FF7ED6BC96C
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C39640_2_00007FF7ED6C3964
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D89A00_2_00007FF7ED6D89A0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D8C1C0_2_00007FF7ED6D8C1C
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BBB900_2_00007FF7ED6BBB90
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B5B600_2_00007FF7ED6B5B60
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C4B980_2_00007FF7ED6C4B98
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6A76C00_2_00007FF7ED6A76C0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E25500_2_00007FF7ED6E2550
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BB5340_2_00007FF7ED6BB534
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6A48400_2_00007FF7ED6A4840
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6DC8380_2_00007FF7ED6DC838
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6A72880_2_00007FF7ED6A7288
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B126C0_2_00007FF7ED6B126C
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6AA3100_2_00007FF7ED6AA310
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6AC2F00_2_00007FF7ED6AC2F0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BF1800_2_00007FF7ED6BF180
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C21D00_2_00007FF7ED6C21D0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C53F00_2_00007FF7ED6C53F0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600CDC009_2_600CDC00
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600D58009_2_600D5800
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600CD6209_2_600CD620
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_6018E2609_2_6018E260
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_601670809_2_60167080
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600D5AE09_2_600D5AE0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_5FDD68509_2_5FDD6850
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600CCBD09_2_600CCBD0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 17_2_0076B9AC17_2_0076B9AC
                  Source: unires_vpd.dll.2.drStatic PE information: Resource name: None type: COM executable for DOS
                  Source: rutserv.exe.2.drStatic PE information: Resource name: RT_RCDATA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                  Source: rfusclient.exe.2.drStatic PE information: Resource name: MAD type: DOS executable (COM, 0x8C-variant)
                  Source: rfusclient.exe.2.drStatic PE information: Resource name: RT_RCDATA type: Zip archive data, at least v2.0 to extract, compression method=deflate
                  Source: unidrvui_rppd.dll0.2.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: unires_vpd.dll0.2.drStatic PE information: Resource name: None type: COM executable for DOS
                  Source: libasset32.dll.2.drStatic PE information: Number of sections : 19 > 10
                  Source: rutserv.exe.2.drStatic PE information: Number of sections : 11 > 10
                  Source: rfusclient.exe.2.drStatic PE information: Number of sections : 11 > 10
                  Source: libcodec32.dll.2.drStatic PE information: Number of sections : 20 > 10
                  Source: unires_vpd.dll0.2.drStatic PE information: No import functions for PE file found
                  Source: unires_vpd.dll.2.drStatic PE information: No import functions for PE file found
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB730000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 442.docx.exe
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB6C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 442.docx.exe
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB673000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 442.docx.exe
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameISRegSvr.dll vs 442.docx.exe
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 442.docx.exe
                  Source: 442.docx.exe, 00000000.00000003.1722235136.000001E8BB5E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSetAllUsers.dll< vs 442.docx.exe
                  Source: 9.0.rfusclient.exe.310000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RemoteUtilitiesRAT author = ditekSHen, description = RemoteUtilitiesRAT RAT payload, clamav_sig = MALWARE.Win.Trojan.RemoteUtilitiesRAT
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, type: DROPPEDMatched rule: MALWARE_Win_RemoteUtilitiesRAT author = ditekSHen, description = RemoteUtilitiesRAT RAT payload, clamav_sig = MALWARE.Win.Trojan.RemoteUtilitiesRAT
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, type: DROPPEDMatched rule: MALWARE_Win_RemoteUtilitiesRAT author = ditekSHen, description = RemoteUtilitiesRAT RAT payload, clamav_sig = MALWARE.Win.Trojan.RemoteUtilitiesRAT
                  Source: unires_vpd.dll0.2.drStatic PE information: Section .rsrc
                  Source: unires_vpd.dll.2.drStatic PE information: Section .rsrc
                  Source: classification engineClassification label: mal92.troj.evad.winEXE@27/327@1/5
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6AB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF7ED6AB6D8
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6C8624 FindResourceExW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF7ED6C8624
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - HostJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\OfficeJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\RManFUSTray
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: NULL
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$898
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1d74
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \BaseNamedObjects\madExceptSettingsMtx$1e74
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1c2c
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\RManFUSLocal
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \BaseNamedObjects\HookTThread$1e74
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \BaseNamedObjects\madExceptSettingsMtx$17d8
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\HookTThread$1fcc
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1f9c
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1d58
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$1fcc
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$76c
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeMutant created: \Sessions\1\BaseNamedObjects\HookTThread$1f9c
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFC37BCDF51AD3764F.TMPJump to behavior
                  Source: 442.docx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Users\user\Desktop\442.docx.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: rfusclient.exeString found in binary or memory: ENGINESDIR: "E:/dev/vcpkg/installed/x86-mingw-static/lib/engines-3"
                  Source: rfusclient.exeString found in binary or memory: MODULESDIR: "E:/dev/vcpkg/installed/x86-mingw-static/lib/ossl-modules"
                  Source: rfusclient.exeString found in binary or memory: E:/dev/vcpkg/installed/x86-mingw-static/lib/ossl-modules
                  Source: rfusclient.exeString found in binary or memory: E:/dev/vcpkg/installed/x86-mingw-static/lib/engines-3
                  Source: C:\Users\user\Desktop\442.docx.exeFile read: C:\Users\user\Desktop\442.docx.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\442.docx.exe "C:\Users\user\Desktop\442.docx.exe"
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\intel\Word.msi" /qn
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\intel\Doc.docx" /o ""
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3A7D5E944AD6C6FD24895B2767E40451
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" -msi_copy "C:\intel\Word.msi"
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /start
                  Source: unknownProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -service
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\intel\Word.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\intel\Doc.docx" /o ""Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3A7D5E944AD6C6FD24895B2767E40451Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" -msi_copy "C:\intel\Word.msi"Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /startJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: oledlg.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: faultrep.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbgcore.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: libasset32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: olepro32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: security.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msftedit.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: idndl.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winhttp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msasn1.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: oleacc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msimg32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_is2022.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_g18030.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_iscii.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winhttp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msasn1.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: oleacc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msimg32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_is2022.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_g18030.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_iscii.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: firewallapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: fwbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: fwpolicyiomgr.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sxs.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winhttp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msasn1.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: oleacc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msimg32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_is2022.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_g18030.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_iscii.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winhttp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msasn1.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: oleacc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msimg32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_is2022.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_g18030.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_iscii.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msxml6.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: mswsock.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptsp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: rsaenh.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: gpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptnet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winnsi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: webio.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: rasadhlp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: oledlg.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msftedit.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msxml6.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: oledlg.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msftedit.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msxml6.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: textshaping.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dataexchange.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: d3d11.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dcomp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dxgi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: oledlg.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: msftedit.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winhttp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: shfolder.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msasn1.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: faultrep.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbghelp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dbgcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: libasset32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: cryptbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: olepro32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: oleacc.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: msimg32.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_is2022.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_g18030.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: c_iscii.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: firewallapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: fwbase.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: fwpolicyiomgr.dll
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSection loaded: sxs.dll
                  Source: C:\Users\user\Desktop\442.docx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Doc.LNK.3.drLNK file: ..\..\..\..\..\..\..\intel\Doc.docx
                  Source: C:\Windows\System32\msiexec.exeFile written: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppd.iniJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
                  Source: 442.docx.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: 442.docx.exeStatic file information: File size 25141051 > 1048576
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 442.docx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 442.docx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 442.docx.exe, 00000000.00000000.1710698957.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmp, 442.docx.exe, 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmp
                  Source: 442.docx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 442.docx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 442.docx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 442.docx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 442.docx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeUnpacked PE file: 9.2.rfusclient.exe.310000.0.unpack
                  Source: C:\Users\user\Desktop\442.docx.exeFile created: C:\intel\__tmp_rar_sfx_access_check_4457687Jump to behavior
                  Source: 442.docx.exeStatic PE information: section name: .didat
                  Source: 442.docx.exeStatic PE information: section name: _RDATA
                  Source: vp8encoder.dll.2.drStatic PE information: section name: .rodata
                  Source: vp8decoder.dll.2.drStatic PE information: section name: .rodata
                  Source: webmvorbisdecoder.dll.2.drStatic PE information: section name: _RDATA
                  Source: libasset32.dll.2.drStatic PE information: section name: /4
                  Source: libasset32.dll.2.drStatic PE information: section name: /14
                  Source: libasset32.dll.2.drStatic PE information: section name: /29
                  Source: libasset32.dll.2.drStatic PE information: section name: /41
                  Source: libasset32.dll.2.drStatic PE information: section name: /55
                  Source: libasset32.dll.2.drStatic PE information: section name: /67
                  Source: libasset32.dll.2.drStatic PE information: section name: /78
                  Source: libasset32.dll.2.drStatic PE information: section name: /94
                  Source: libasset32.dll.2.drStatic PE information: section name: /110
                  Source: libcodec32.dll.2.drStatic PE information: section name: .rodata
                  Source: libcodec32.dll.2.drStatic PE information: section name: /4
                  Source: libcodec32.dll.2.drStatic PE information: section name: /14
                  Source: libcodec32.dll.2.drStatic PE information: section name: /29
                  Source: libcodec32.dll.2.drStatic PE information: section name: /41
                  Source: libcodec32.dll.2.drStatic PE information: section name: /55
                  Source: libcodec32.dll.2.drStatic PE information: section name: /67
                  Source: libcodec32.dll.2.drStatic PE information: section name: /78
                  Source: libcodec32.dll.2.drStatic PE information: section name: /94
                  Source: libcodec32.dll.2.drStatic PE information: section name: /110
                  Source: eventmsg.dll.2.drStatic PE information: section name: .didata
                  Source: webmvorbisencoder.dll.2.drStatic PE information: section name: _RDATA
                  Source: vccorlib120.dll.2.drStatic PE information: section name: minATL
                  Source: rutserv.exe.2.drStatic PE information: section name: .didata
                  Source: rfusclient.exe.2.drStatic PE information: section name: .didata
                  Source: vccorlib120.dll0.2.drStatic PE information: section name: minATL
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E5166 push rsi; retf 0_2_00007FF7ED6E5167
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E5156 push rsi; retf 0_2_00007FF7ED6E5157
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeCode function: 9_2_600E7E30 push eax; mov dword ptr [esp], esi9_2_600E7ED1
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeCode function: 16_2_00D2C34B push ebx; ret 16_2_00D2C354
                  Source: msvcr120.dll.2.drStatic PE information: section name: .text entropy: 6.95576372950548
                  Source: VPDAgent.exe.2.drStatic PE information: section name: .text entropy: 6.812931691200469
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\VPDAgent.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcr120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrv_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\emf2pdf.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_start_C00864331B9D4391A8A26292A601EBE2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\webmmux.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrvui_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF85.tmpJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdpm.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcr120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdui.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\libasset32.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\setupdrv.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\vccorlib120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisencoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpd_sdk.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\vccorlib120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\progressbar.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdpm.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\fwproc.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\MessageBox.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\libcodec32.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcp120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\eventmsg.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisdecoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\vp8decoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\properties.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrvui_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpdisp.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unires_vpd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\pdfout.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcp120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\srvinst.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\vp8encoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdui.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_start_C00864331B9D4391A8A26292A601EBE2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF85.tmpJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exeJump to dropped file
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeFile created: C:\ProgramData\Remote Manipulator System\install.log
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Remote Manipulator System - Host\EULA.rtfJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: docx.exeStatic PE information: 442.docx.exe
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeRegistry key monitored for changes: HKEY_USERS.DEFAULT\Software\Classes
                  Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SYSTEM\RMS Host Installer SecurityJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeSystem information queried: FirmwareTableInformation
                  Source: rutserv.exe, 0000000A.00000000.1843751400.0000000001221000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 0000000F.00000002.1951137481.0000000002238000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                  Source: rutserv.exe, 0000000F.00000002.1951137481.0000000002238000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXEE
                  Source: rutserv.exe, 0000000A.00000002.1885182179.00000000022E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXEI
                  Source: rutserv.exe, 0000000F.00000002.1951137481.0000000002238000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE<
                  Source: rutserv.exe, 0000000A.00000002.1885182179.00000000022E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXEA
                  Source: rutserv.exe, 0000000A.00000002.1885182179.00000000022E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXEW
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeWindow / User API: threadDelayed 6337
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\VPDAgent.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrv_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcr120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\emf2pdf.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_start_C00864331B9D4391A8A26292A601EBE2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\webmmux.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrvui_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIF85.tmpJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdpm.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcr120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdui.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\setupdrv.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\vccorlib120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisencoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpd_sdk.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\vccorlib120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\progressbar.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdpm.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\fwproc.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\MessageBox.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcp120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\libcodec32.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\eventmsg.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\properties.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\vp8decoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisdecoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrvui_rppd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpdisp.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unires_vpd.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\pdfout.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\srvinst.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcp120.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\vp8encoder.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdui.dllJump to dropped file
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_9-6556
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeAPI coverage: 5.8 %
                  Source: C:\Windows\System32\svchost.exe TID: 7916Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 2132Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 7992Thread sleep time: -50000s >= -30000s
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 8124Thread sleep time: -60000s >= -30000s
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 8112Thread sleep count: 6337 > 30
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 8112Thread sleep time: -63370s >= -30000s
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 8072Thread sleep time: -60000s >= -30000s
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 6740Thread sleep time: -30000s >= -30000s
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe TID: 8124Thread sleep time: -60000s >= -30000s
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6B40BC
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6CB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6CB190
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6DFCA0 FindFirstFileExA,0_2_00007FF7ED6DFCA0
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D16A4 VirtualQuery,GetSystemInfo,0_2_00007FF7ED6D16A4
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeThread delayed: delay time: 50000
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeThread delayed: delay time: 60000
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeThread delayed: delay time: 60000
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeThread delayed: delay time: 60000
                  Source: svchost.exe, 00000005.00000002.3418863473.000001C99802B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                  Source: svchost.exe, 00000005.00000002.3419675889.000001C99D457000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3574164629.00000000024C8000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1965487513.0000000002577000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.2094884831.0000000002577000.00000004.00000020.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1960578808.0000000002566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: rfusclient.exe, 00000009.00000002.1838575078.000000000145D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7ED6D76D8
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6E0D20 GetProcessHeap,0_2_00007FF7ED6E0D20
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /startJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7ED6D76D8
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7ED6D3170
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D2510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7ED6D2510
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D3354 SetUnhandledExceptionFilter,0_2_00007FF7ED6D3354
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6CB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6CB190
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\intel\Word.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\442.docx.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\intel\Doc.docx" /o ""Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe "C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewallJump to behavior
                  Source: rfusclient.exe, 00000009.00000000.1816392501.000000000035F000.00000020.00000001.01000000.0000000B.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSV
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6BDC70 cpuid 0_2_00007FF7ED6BDC70
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF7ED6CA2CC
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6D0754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7ED6D0754
                  Source: C:\Users\user\Desktop\442.docx.exeCode function: 0_2_00007FF7ED6B4EB0 GetVersionExW,0_2_00007FF7ED6B4EB0
                  Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: rutserv.exe, 0000000A.00000000.1843751400.0000000001221000.00000020.00000001.01000000.0000000D.sdmpBinary or memory string: OLLYDBG.EXE
                  Source: rutserv.exe, 0000000F.00000002.1951137481.0000000002238000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
                  Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD BlobJump to behavior
                  Source: Yara matchFile source: 9.0.rfusclient.exe.310000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000012.00000002.3573808248.000000000314A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.3573808248.0000000003118000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.3572801729.00000000017DA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.3579027400.0000000004B64000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.3572801729.00000000017B6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000012.00000002.3579027400.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rfusclient.exe PID: 1900, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rutserv.exe PID: 2200, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rutserv.exe PID: 7796, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Replication Through Removable Media
                  1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  2
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  DLL Side-Loading
                  13
                  Obfuscated Files or Information
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Extra Window Memory Injection
                  12
                  Software Packing
                  Security Account Manager3
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook12
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS67
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  File Deletion
                  LSA Secrets1
                  Query Registry
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Extra Window Memory Injection
                  Cached Domain Credentials241
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items122
                  Masquerading
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Modify Registry
                  Proc Filesystem121
                  Virtualization/Sandbox Evasion
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt121
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1567328 Sample: 442.docx.exe Startdate: 03/12/2024 Architecture: WINDOWS Score: 92 49 main.internetid.ru 2->49 51 id72.internetid.ru 2->51 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Detected unpacking (overwrites its own PE header) 2->65 67 4 other signatures 2->67 8 msiexec.exe 96 95 2->8         started        11 rutserv.exe 2->11         started        15 442.docx.exe 7 5 2->15         started        17 svchost.exe 1 1 2->17         started        signatures3 process4 dnsIp5 41 server_stop_27D787...EA10FB36BB4D2F9.exe, PE32 8->41 dropped 43 server_start_C0086...8A26292A601EBE2.exe, PE32 8->43 dropped 45 server_config_C8E9...5F92E4E3AE550F0.exe, PE32 8->45 dropped 47 41 other files (10 malicious) 8->47 dropped 19 rutserv.exe 8->19         started        22 rutserv.exe 8->22         started        24 rfusclient.exe 6 8->24         started        36 2 other processes 8->36 53 111.90.147.125, 465, 49870, 49871 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 11->53 55 78.138.9.142, 49874, 49875, 50002 SKYVISIONGB United Kingdom 11->55 59 2 other IPs or domains 11->59 75 Query firmware table information (likely to detect VMs) 11->75 26 rfusclient.exe 11->26         started        28 rfusclient.exe 11->28         started        30 rutserv.exe 11->30         started        32 WINWORD.EXE 139 444 15->32         started        34 msiexec.exe 15->34         started        57 127.0.0.1 unknown unknown 17->57 file6 signatures7 process8 signatures9 69 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 19->69 71 Query firmware table information (likely to detect VMs) 26->71 38 rfusclient.exe 26->38         started        process10 signatures11 73 Query firmware table information (likely to detect VMs) 38->73

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\MessageBox.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\VPDAgent.exe0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\emf2pdf.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\fwproc.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\pdfout.dll2%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\progressbar.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\properties.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\srvinst.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpd_sdk.dll2%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\vpdisp.exe2%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcp120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\msvcr120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdpm.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rppdui.dll4%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrv_rppd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrvui_rppd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\vccorlib120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcp120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\msvcr120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdpm.dll2%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rppdui.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\setupdrv.exe3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rppd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrvui_rppd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unires_vpd.dll3%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\vccorlib120.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\eventmsg.dll8%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\libasset32.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\libcodec32.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe13%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe12%ReversingLabsWin32.Trojan.Generic
                  C:\Program Files (x86)\Remote Manipulator System - Host\vp8decoder.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\vp8encoder.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\webmmux.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisdecoder.dll0%ReversingLabs
                  C:\Program Files (x86)\Remote Manipulator System - Host\webmvorbisencoder.dll0%ReversingLabs
                  C:\Windows\Installer\MSIF85.tmp0%ReversingLabs
                  C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\ARPPRODUCTICON.exe0%ReversingLabs
                  C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe0%ReversingLabs
                  C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exe0%ReversingLabs
                  C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_start_C00864331B9D4391A8A26292A601EBE2.exe0%ReversingLabs
                  C:\Windows\Installer\{77817ADF-D5EC-49C6-B987-6169BBD5345B}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exe0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://rmansys.ru/rd0%Avira URL Cloudsafe
                  http://rmansys.ru/web-help/eb-help/D0%Avira URL Cloudsafe
                  http://schemas.dm0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  main.internetid.ru
                  95.213.205.83
                  truefalse
                    unknown
                    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
                    84.201.208.103
                    truefalse
                      high
                      id72.internetid.ru
                      unknown
                      unknownfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.remoteutilities.com/support/docs/installing-and-uninstalling/rfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://rmansys.ru///rmansys.ru/rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            https://curl.se/docs/http-cookies.htmlrfusclient.exe, 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmp, rutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpfalse
                              high
                              http://update.tektonit.ru/upgrade.inirutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmpfalse
                                high
                                http://update.tektonit.ru/upgrade_beta.inirutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmpfalse
                                  high
                                  http://madExcept.comUrfusclient.exe, 00000009.00000000.1816392501.000000000035F000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1929061008.000000007B5F0000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1939132075.000000007CAC0000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/soap/envelope/rfusclient.exe, 00000009.00000000.1816392501.000000000035F000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000000821000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1929061008.000000007B5F0000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000003.1939132075.000000007CAC0000.00000004.00001000.00020000.00000000.sdmpfalse
                                      high
                                      http://rmansys.ru/rdrutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://rmansys.ru/web-help/eb-help/rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.ver)svchost.exe, 00000005.00000002.3419566312.000001C99D400000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000005.00000003.1765637227.000001C99D6E3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D728000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D747000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1765637227.000001C99D734000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://rmansys.ru/pfrutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                              high
                                              http://www.indyproject.org/rfusclient.exe, 00000009.00000003.1836674180.0000000003005000.00000004.00001000.00020000.00000000.sdmp, rfusclient.exe, 00000009.00000000.1816392501.0000000000B6B000.00000020.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1843751400.0000000001221000.00000020.00000001.01000000.0000000D.sdmp, rutserv.exe, 0000000A.00000003.1880620859.0000000003F75000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 0000000C.00000003.1911028682.0000000003F85000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 0000000F.00000003.1939737722.0000000003F05000.00000004.00001000.00020000.00000000.sdmp, rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://curl.se/docs/alt-svc.htmlrutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpfalse
                                                  high
                                                  http://www.symauth.com/cps0(442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://rmansys.ru/internet-id/rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000002.3604652724.000000000482F000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      http://rmansys.ru/web-help/eb-help/Drutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://curl.se/docs/hsts.htmlrutserv.exe, 0000000A.00000002.1895252133.0000000060277000.00000002.00000001.01000000.0000000C.sdmpfalse
                                                        high
                                                        https://g.live.com/odclientsettings/Prod.C:svchost.exe, 00000005.00000003.1765637227.000001C99D73F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://gcc.gnu.org/bugsrg/bugs/):rutserv.exe, 0000000A.00000002.1895252133.000000006028F000.00000002.00000001.01000000.0000000C.sdmpfalse
                                                            high
                                                            https://g.live.com/odclientsettings/ProdV2svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtdrfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                                  high
                                                                  http://www.symauth.com/rpa00442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://rmansys.ru/remote-access//rmansys.ru/remote-access/rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://rmansys.ru/remote-access//rmansys.ru/remote-access/Orutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://rmansys.ru/rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://rmansys.ru/remote-access/rutserv.exe, 00000010.00000002.3578675457.0000000002A6E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://rmansys.ru/nsys.ru/pfrutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.flexerasoftware.com0442.docx.exe, 00000000.00000003.1722235136.000001E8BB661000.00000004.00000020.00020000.00000000.sdmp, 442.docx.exe, 00000000.00000003.1722235136.000001E8BB623000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://rmansys.ru/IS_PREVENT_DOWNGRADE_EXITZ_DOWNGRADE_DETECTED;Z_UPGRADE_DETECTED;COMPANYNAME;INST442.docx.exe, 00000000.00000003.1722235136.000001E8BB591000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.inkscape.org/namespaces/inkscaperfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                                                    high
                                                                                    https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000005.00000003.1765637227.000001C99D702000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.remoteutilities.com/buy/money-back-guarantee.phprfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://www.remoteutilities.com/about/privacy-policy.phprfusclient.exe, 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, rutserv.exe, 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, rutserv.exe, 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.dmsvchost.exe, 00000005.00000003.3118282077.000001C9980B1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3419150789.000001C9980B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          http://rmansys.ru///rmansys.ru/;rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://rmansys.ru/web-help/rutserv.exe, 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              109.234.156.179
                                                                                              unknownRussian Federation
                                                                                              49505SELECTELRUfalse
                                                                                              111.90.147.125
                                                                                              unknownMalaysia
                                                                                              45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue
                                                                                              78.138.9.142
                                                                                              unknownUnited Kingdom
                                                                                              8513SKYVISIONGBfalse
                                                                                              95.213.205.83
                                                                                              main.internetid.ruRussian Federation
                                                                                              50340SELECTEL-MSKRUfalse
                                                                                              IP
                                                                                              127.0.0.1
                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                              Analysis ID:1567328
                                                                                              Start date and time:2024-12-03 12:46:00 +01:00
                                                                                              Joe Sandbox product:CloudBasic
                                                                                              Overall analysis duration:0h 10m 45s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:full
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                              Run name:Run with higher sleep bypass
                                                                                              Number of analysed new started processes analysed:22
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Sample name:442.docx.exe
                                                                                              renamed because original name is a hash value
                                                                                              Original Sample Name: .docx.exe
                                                                                              Detection:MAL
                                                                                              Classification:mal92.troj.evad.winEXE@27/327@1/5
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 83.3%
                                                                                              HCA Information:Failed
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .exe
                                                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 23.218.208.109, 52.109.89.19, 84.201.208.103, 52.111.252.17, 52.111.252.15, 52.111.252.16, 52.111.252.18, 52.182.143.208, 95.101.110.60, 95.101.110.34, 95.101.110.24, 95.101.110.31, 95.101.110.27, 23.32.238.192, 23.32.238.169, 104.18.21.226, 104.18.20.226
                                                                                              • Excluded domains from analysis (whitelisted): binaries.templates.cdn.office.net.edgesuite.net, slscr.update.microsoft.com, cdn.globalsigncdn.com.cdn.cloudflare.net, templatesmetadata.office.net.edgekey.net, weu-azsc-000.roaming.officeapps.live.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, ocsp.globalsign.com, a1847.dscg2.akamai.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, onedscolprdcus04.centralus.cloudapp.azure.com, wu-b-net.trafficmanager.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, prod-all.naturallanguageeditorservice.osi.office.net.akadns.net, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, prod-inc-resolver.naturallanguageeditorservice.osi.office.net.akadns.n
                                                                                              • Execution Graph export aborted for target rutserv.exe, PID 2200 because there are no executed function
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                              • VT rate limit hit for: 442.docx.exe
                                                                                              No simulations
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              95.213.205.83ExeFile (206).exeGet hashmaliciousRMSRemoteAdmin, XmrigBrowse
                                                                                                winserv.exeGet hashmaliciousRMSRemoteAdmin, xRATBrowse
                                                                                                  winserv.exeGet hashmaliciousRMSRemoteAdmin, xRATBrowse
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    main.internetid.ruhttps://bitbucket.org/ziphose/obmen/downloads/Doc.7zGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                    • 95.213.205.83
                                                                                                    ExeFile (206).exeGet hashmaliciousRMSRemoteAdmin, XmrigBrowse
                                                                                                    • 95.213.205.83
                                                                                                    winserv.exeGet hashmaliciousRMSRemoteAdmin, xRATBrowse
                                                                                                    • 95.213.205.83
                                                                                                    winserv.exeGet hashmaliciousRMSRemoteAdmin, xRATBrowse
                                                                                                    • 95.213.205.83
                                                                                                    3C77C16EE21FF2F584B1EB5DF4882976A934D50D1D4E0.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                    • 95.213.205.83
                                                                                                    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comEmployee_Important_Message.pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 84.201.208.99
                                                                                                    SPP_14667098030794_8611971920#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                    • 84.201.208.101
                                                                                                    rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                    • 84.201.211.40
                                                                                                    1d5sraR1S1.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 84.201.211.39
                                                                                                    file.exeGet hashmaliciousStealcBrowse
                                                                                                    • 217.20.56.100
                                                                                                    file.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                                                                    • 217.20.56.102
                                                                                                    Employee_Important_Message.pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 84.201.208.106
                                                                                                    Scan_6090402.pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 217.20.56.101
                                                                                                    kingsmaker_6.ca.ps1Get hashmaliciousDucktailBrowse
                                                                                                    • 84.201.208.102
                                                                                                    Demande de proposition du Regional Development Network .pdfGet hashmaliciousUnknownBrowse
                                                                                                    • 84.201.208.67
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    SKYVISIONGBla.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 83.229.59.112
                                                                                                    https://www.google.ml/url?fvg=1YI3fC8whlGPBCiMyiuQ&bhtBf=8EQhXbuMThqowIo0zyCX&sa=t&ndg=afydNw3nDHf9A6uq2MCH&url=amp%2Fiestpcanipaco.edu.pe%2F.r%2Fu1kOgE-SURELILYYWRhcnNoLm1hbGhvdHJhQGphdG8uY29tGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 78.138.9.37
                                                                                                    arm4.elfGet hashmaliciousMiraiBrowse
                                                                                                    • 217.194.146.92
                                                                                                    la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 217.194.158.58
                                                                                                    shipping documents_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                    • 83.229.19.82
                                                                                                    https://bread.nfpt.adfixagency.co.in/Get hashmaliciousUnknownBrowse
                                                                                                    • 78.138.9.37
                                                                                                    https://bread1.nfpt.adfixagency.co.in/landingv2Get hashmaliciousUnknownBrowse
                                                                                                    • 78.138.9.37
                                                                                                    SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYVendor Agreement Ready for Your Signature November 22 2024 at 084923 PM.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 101.99.75.104
                                                                                                    http://amz-account-unlock-dashboard4.duckdns.orgGet hashmaliciousUnknownBrowse
                                                                                                    • 111.90.149.151
                                                                                                    https://texasbarcle.com/CLE/AAGateway.asp?lRefID=19203&sURL=https://famezik.com/#Zi5waWNhc3NvJG1hcmxhdGFua2Vycy5ncg==Get hashmaliciousUnknownBrowse
                                                                                                    • 111.90.141.53
                                                                                                    Ssc Executed Docs#962297(Revised).docxGet hashmaliciousUnknownBrowse
                                                                                                    • 111.90.146.230
                                                                                                    amen.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 101.99.125.192
                                                                                                    botnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                    • 124.217.225.17
                                                                                                    0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 111.90.140.76
                                                                                                    SELECTELRUnabppc.elfGet hashmaliciousUnknownBrowse
                                                                                                    • 85.119.147.53
                                                                                                    6X4BIzTTBR.exeGet hashmaliciousStealcBrowse
                                                                                                    • 176.113.115.37
                                                                                                    vwkb5DQRAL.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                    • 176.113.115.37
                                                                                                    IeccNv7PP6.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                    • 176.113.115.37
                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 176.113.115.177
                                                                                                    qlI3ReINCV.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                    • 176.113.115.215
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                                    • 176.113.115.203
                                                                                                    XOr3Kqyo9n.exeGet hashmaliciousStealcBrowse
                                                                                                    • 176.113.115.37
                                                                                                    0r9PL33C8E.exeGet hashmaliciousStealcBrowse
                                                                                                    • 176.113.115.37
                                                                                                    No context
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    C:\Program Files (x86)\Remote Manipulator System - Host\Printer\common\MessageBox.exehttps://bitbucket.org/ziphose/obmen/downloads/Doc.7zGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                      J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                        J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                          SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                            SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                              044f.pdf.scrGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                                3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:modified
                                                                                                                  Size (bytes):33259
                                                                                                                  Entropy (8bit):5.289166899208134
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:n5t4t4t+ZXTWBwp1KwUXciM01HuECHgCg4gcgblFljY3TY3s8:qCBwpswUXceHuECHgCg4gcgblFlE3U3j
                                                                                                                  MD5:22641644251074FE8A4B2152864D3A5A
                                                                                                                  SHA1:5D06BEE490179007C4E4E626080AC3E5E3747FCF
                                                                                                                  SHA-256:E061FEF209F79109F2B24C96C3517946F1EFCD24252678AAB6A00EB2442F16E1
                                                                                                                  SHA-512:D1F495B16EE2E775F39985EB4FBA4AFEC8D4094339D6EF2B13353CF5151A97436280835A80F6FC3D241782E6FC94064A9B7D0B0D2E01D291987FF2A1C1EB185C
                                                                                                                  Malicious:false
                                                                                                                  Preview:...@IXOS.@.....@.5.Y.@.....@.....@.....@.....@.....@......&.{77817ADF-D5EC-49C6-B987-6169BBD5345B} .Remote Manipulator System - Host..Word.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{134AA6F2-2A49-44F2-A7A5-B7B9233956FA}.....@.....@.....@.....@.......@.....@.....@.......@.... .Remote Manipulator System - Host......Rollback....B.:.0.B. .4.5.9.A.B.2.8.O.:...[1]..RollbackCleanup..#.4.0.;.5.=.8.5. .2.@.5.<.5.=.=.K.E. .D.0.9.;.>.2...$.0.9.;.:. .[.1.].....ProcessComponents"...1.=.>.2.;.5.=.8.5. .@.5.3.8.A.B.@.0.F.8.8. .:.>.<.?.>.=.5.=.B.>.2...&.{74F2505E-B20A-4AED-968F-AE5B278DB38A}&.{77817ADF-D5EC-49C6-B987-6169BBD5345B}.@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}&.{77817ADF-D5EC-49C6-B987-6169BBD5345B}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{77817ADF-D5EC-49C6-B987-6169BBD5345B}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{00000000-0000-0000-0000-000000000000}.@......&.{182310A2-CD9E-4171-ACD1-3AEDD260A15F}&.{77817ADF-D5EC-49C6-B987-6169BBD5345B}.@......&.{3244CD
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):118
                                                                                                                  Entropy (8bit):3.5700810731231707
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                                                                                                  MD5:573220372DA4ED487441611079B623CD
                                                                                                                  SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                                                                                                  SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                                                                                                  SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                                                                                                  Malicious:false
                                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):140524
                                                                                                                  Entropy (8bit):4.705761523836363
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:wu3K4JDvJNJt2cGTXxl5loUWDTEhkClEgoKt9ai1IYdO5NVSUeDfydxqXJe2JNC0:wu93dN2OqrYZlKhIiSEGQ4wL
                                                                                                                  MD5:65B04B706AC06E31210F4FFB1E92994E
                                                                                                                  SHA1:B005637B3DE903CBD7960637D77FF993897C5A63
                                                                                                                  SHA-256:E9ACC22A02BC2148AE07EC7CBE741E6E1CBC90DE3856AAE8F32A31FB5C338566
                                                                                                                  SHA-512:5B708D069434A384738EFD5F4621F257FC79A7F5A32D8AE9C1D29E21EFE1EEB2C393EC67DA39714C0C73F2217B68091EE7196C72331838A0A7ECA872FAF09A09
                                                                                                                  Malicious:false
                                                                                                                  Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch31506\stshfhich31506\stshfbi31506\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}..{\f1\fbidi \fswiss\fcharset204\fprq2{\*\panose 020b0604020202020204}Arial;}{\f2\fbidi \fmodern\fcharset204\fprq1{\*\panose 02070309020205020404}Courier New;}{\f3\fbidi \froman\fcharset2\fprq2{\*\panose 05050102010706020507}Symbol;}..{\f10\fbidi \fnil\fcharset2\fprq2{\*\panose 05000000000000000000}Wingdings;}{\f34\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}..{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 0204
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):15680
                                                                                                                  Entropy (8bit):6.579534230870796
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:XxgSABvdm4Yy3EA39QKoEp0Fm7qFAmL8x2fLWwsU7K6CYv7+C:Xx0FmW3Ea1KmexmMK6jr
                                                                                                                  MD5:C2F009D6317D1BA4E722938A1408478A
                                                                                                                  SHA1:66D702BC9FA98D1E7FE9BBC16AFF9AE711019E9B
                                                                                                                  SHA-256:6A8D4FB6F90B53D986B2AC6BF3BFCC56D6A54A2E8AF5670129566F5D344ED0FA
                                                                                                                  SHA-512:4D8060EC77EB9B95B57BC20AF2685064FA1E1FCC9403EFE95572C37D72ACD39B8005831EA0BAE95C365E945E50962B7FE1BFD964C5776D3E99CE5E474F726BFE
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Joe Sandbox View:
                                                                                                                  • Filename: , Detection: malicious, Browse
                                                                                                                  • Filename: J4zGPhVRV3.exe, Detection: malicious, Browse
                                                                                                                  • Filename: J4zGPhVRV3.exe, Detection: malicious, Browse
                                                                                                                  • Filename: SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exe, Detection: malicious, Browse
                                                                                                                  • Filename: SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exe, Detection: malicious, Browse
                                                                                                                  • Filename: 044f.pdf.scr, Detection: malicious, Browse
                                                                                                                  • Filename: 3e#U043c.scr, Detection: malicious, Browse
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........3.j.]Oj.]Oj.]Og..Oh.]Og..Oh.]Og..Oy.]Og..Oh.]Oc..Oc.]Oj.\OY.]O..Ok.]Og..Ok.]O..Ok.]ORichj.]O........................PE..L......S..................................... ....@..........................`.......J....@.................................."..x....@..................@....P..|....!..8............................!..@............ ...............................text...2........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc..|....P......................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2673984
                                                                                                                  Entropy (8bit):6.865614554810881
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:BE8JxHX5r9sDQl7wDSMSFxvQ/qpyr0k0ha5XLDaDMPNw2x8pWTUKA76AeF8:BE8XHX5riUl7wDP6vQ/qpyr0kR5XLWDB
                                                                                                                  MD5:10CD2135C0C5D9D3E5A0A5B679F2FAAE
                                                                                                                  SHA1:A0617D8C6876F98B9A1819A71F2A56B965C1C75D
                                                                                                                  SHA-256:D7A97387505CA740AC88E85CAC3AA3CA73C666CC3BFD977C7E40B1D9D6CA6C12
                                                                                                                  SHA-512:6A1F81127FF26DCC235D7CE454E69F9A3784AC54BBC8486CB5022AAC47C2FB6003641A0F8AAFDD3B89812FE3C1C90569AD73C1C135687C042CE92C5DD2FFBDD8
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............zz..zz..zz.M...zz.+...zz.+...zz.+...zz.+...zz.f...zz..zz..zz.f..Oxz..z{..{z......zz.f...zz..(...zz..z...zz.f...zz.Rich.zz.........PE..L...h3.\............................5u............@.......................... ).......(...@.................................<.&.......'.H.............(.@.....'..n..................................0:&.@............................................text...5........................... ..`.rdata..............................@..@.data...<.....&..d....&.............@....rsrc...H.....'......8'.............@..@.reloc...n....'..p...>'.............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1110848
                                                                                                                  Entropy (8bit):6.491478844569486
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:TqSQS800orApz53PI2GVqH7kpf/V57GGcP6T5m+moXafzb:tQSX0oAtkpf/bfcyTTmoozb
                                                                                                                  MD5:AB3E77FC94445A18C9376F98CE10102F
                                                                                                                  SHA1:9424736FB3DB517C5584A14A482F84D81A671F8D
                                                                                                                  SHA-256:EEE325D9AC6A7B24B8ED3742110BD042803D6DA065F2E51153151E69D51CE4A3
                                                                                                                  SHA-512:454115C621434E98D39AEC605FCEB349C7AFB938B3E822F5950EE60E54FBFCB5CDBFE750015FE947C07FB991B4E966E535640343294D885ED2661353D3FD6EC9
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........[.:..:..:....l.:....n.7:....o.:..d..:..d...:..d..:..u.V.:..?d...:..?d..:..?d..:..:..T:..?d..:..?d..:..:db.:..?d..:..Rich.:..........................PE..L......\...........!......................................................................@.............................|....&..d.......................@........l......p...............................@............................................text............................... ..`.rdata..p;.......<..................@..@.data...H;...@...*..................@....gfids..$............X..............@..@.rsrc................d..............@..@.reloc...l.......n...f..............@..B........................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22848
                                                                                                                  Entropy (8bit):6.464002114523214
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:2+b57Gk7g+iy21oCiDuK9jkrtpgjKMpFmexmMK6j8qF2:7/210DuVrtsKM3ZxBKghF2
                                                                                                                  MD5:2DE35EAAE57A6BAA02D9E8ED0661F042
                                                                                                                  SHA1:82D14A58D5188F5B7606365BE0E3F968A8E81E93
                                                                                                                  SHA-256:BB43036D202D3DBD765A12D1C4C243E7AB8328FFC1941AEA838D8B1553700E64
                                                                                                                  SHA-512:02F1D530C1469431A94074A057FCE3FE60735D3B15DD767E8F39F29B702B98B061954063D83D5FA426D7684CC86359E87424F0CC54FFB0AC3F388AA7E48D6DE0
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9Gf.}&.I}&.I}&.I;w.I|&.I;w.In&.I;w.Iy&.I;w.Iy&.It^.Ix&.I}&.I?&.I..I|&.Ipt.I|&.I}&.I|&.I..I|&.IRich}&.I................PE..L...k3.\.....................8......e".......0....@.......................................@.................................49..d....`..@............:..@....p......@1..8............................5..@............0...............................text...k........................... ..`.rdata..:....0......................@..@.data........@......................@....rsrc...@....`.......0..............@..@.reloc.......p.......6..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4005696
                                                                                                                  Entropy (8bit):6.809616089473951
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:98304:lbR+lDT6t58JcKdTG57M06POn9rvBAUZLM8FAK:FR+lDOt5kgFvVwmd
                                                                                                                  MD5:2C5987EA1E87A5C073B780F8102AE09C
                                                                                                                  SHA1:78DAA99D8C59A4A2E0D3B59E5427F854D8613080
                                                                                                                  SHA-256:22AC34380064C0FFEE59AD892CA4695E94EE8F97B78C18565251295817A784FE
                                                                                                                  SHA-512:7D6432960C5F3BEC27B13D06D4126C91A1DD7DD702DE97F1001855D8572BE68D6526F419BB58F5E5238E8E8F81C801BDAD8F351EF0AE75564835146F3DD3434D
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 2%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.............3.......3.......3.............................fP8.............,......,.......,...Z...,.......).......,.......Rich....................PE..L......\...........!.....b"..0................"...............................=.....3.=...@.........................pA:......p:.d.....;...............=.@.....;.$.....6.p.....................6.....p.6.@.............".d............................text...9a"......b"................. ..`.rdata..(....."......f".............@..@.data.........:..j...f:.............@....gfids........;.......:.............@..@.tls..........;.......:.............@....rsrc.........;.......:.............@..@.reloc..$.....;.. ....:.............@..B................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):10134
                                                                                                                  Entropy (8bit):5.364629779133003
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:75LkqDCmLVf89uqywWrvNCB4isySOc3AOv2B+YT1/44tuU+3:1OmLVf4dErvNCB5tSOc3AY2BP944g
                                                                                                                  MD5:6F70BD62A17EC5B677EC1129F594EE6F
                                                                                                                  SHA1:4FB95EB83A99C0DA62919C34886B0A3667F3911E
                                                                                                                  SHA-256:FC8570D50C1773A1B34AA4E31143FD0776E26FF032EE3EEB6DB8BFAB42B4A846
                                                                                                                  SHA-512:615A7E8738B2CF1BC47C8D5FC1357C1299080D0BAA1E54129D0DEBDB6BA60CD366364BE0BDAFDABCBA60F16544B0516A50B4B0182E8BCF01F59171003CE9B244
                                                                                                                  Malicious:false
                                                                                                                  Preview:...... ..........f...........(...N... ..........v...........h....... .... ............... .h....#..(... ...@.....................................................................................................................................................x..............wx.............ww.............ww.x...........ww.xx..........ww.wxx..........w.wwxx...........wwwxx..........xwwwxx..........xwwwx...........xwww..x.........xww.wx.x........xw.wwwx.x.......x.w|.x.x.x........z.x.ww..x......x.x.ww....x......x..w....x.x......x.....p.x........x................x....................p................................p..........................................................................................................................................................................................................?...........?............(....... ..........................................................................................................x......w......w.x......wx.....wwx.....w
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):39744
                                                                                                                  Entropy (8bit):6.36744082696392
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:TkzqOI138e1y6JMKxTrAogoAoaP7+qFXYiLxjdQzUQ9LSk3E0gTSsn2TkhI3K0Jn:TLqokSaddQzUNk3EXSsn2Tk4ZZxBKgfP
                                                                                                                  MD5:9ED8BAA9DEC76C6AFAFC1C71193A0AE8
                                                                                                                  SHA1:843727F195BF194CFF3736B80FB5249713F1E116
                                                                                                                  SHA-256:CD2C60402D46C339147ADDF110C904F78A783F23106CCAD147EFA156175D66DE
                                                                                                                  SHA-512:40D85540176AB0170B7341D6A8A808FD351B35C6444D468E7707B35D2B2E8F3322DBF0BF31E0578E3A12E1A62B310DD7983B7EFB0F2C72D0C4104AEB0BBCEFF9
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............b..b..b..3...b..3+..b..3*..b..3...b.Z....b...X..b..b..b.Z....b..0...b..b\..b.Z....b.Rich.b.................PE..L....3.\.................D...8.......I.......`....@.......................................@..................................s.......................|..@............b..8............................j..@............`...............................text....C.......D.................. ..`.rdata.......`... ...H..............@..@.data................h..............@....rsrc................l..............@..@.reloc...............t..............@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):179520
                                                                                                                  Entropy (8bit):5.239011393842513
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:+vQrKBVxKfGkHM5ZZ+HHJOWfuXO8zIJ1k9XHX8t0wk7UAjKQpmErUaDO3nG:3kjiTGD+JOWGT00XHXo0w+mErBO3G
                                                                                                                  MD5:FF197487BFE7E9D3396E0793B83811ED
                                                                                                                  SHA1:D92CA066B79DF28BF22BB051AEDFE10E4FA4A2A6
                                                                                                                  SHA-256:E6D0CA844514FDD105772E72C7C30D47099112AB68A4A5F9E4A2B28C0372A05A
                                                                                                                  SHA-512:33A13B0EE7E3DD038B35B5E4220278016397D003DCEECA56C3EE264608E053940AAFC09AE582C0FD67DFA919F38265883269F6C1A93E5BB9047B97F4A51CACCE
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z............X.1....X......X.3....X........m......}....D3.........D.......5......y....D0....Rich...........................PE..L....3.\.................\..........8........p....@..........................0......T.....@.................................,5.......`..V...............@....... ....z..8...........................(...@............0..,............................text....[.......\.................. ..`.rdata...D...p...F...`..............@..@.data....l..........................@....idata...$...0...&..................@..@.rsrc...V....`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):98650
                                                                                                                  Entropy (8bit):4.192473934109759
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:5rENOwVRq6rZmor3CmRxhESLGZ0s1JP2PY6rZIshvwmE2uJJ6rZqDJK1YRo6rZGx:S9miFao0WDn
                                                                                                                  MD5:1614E6CDF119FD284D476F7E6723B3AD
                                                                                                                  SHA1:3FF9164C9E5FC47169CC1C6EECA22AAB099F2EA3
                                                                                                                  SHA-256:C8DF350F95FFEEED30060092DC8666EADCE040A4DDCB98E7A9293F87D19387A8
                                                                                                                  SHA-512:8FBCB156B2F9637BC15FA71758A361CB2500F5A19875EE6BE2B52FC3171C38353A6CDC623E36777D052E0B319C7AF934D2D1DBE92E69666C9B9AD749610BA471
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.E.n.g.l.i.s.h.].....L.a.n.g.I.D.=.1.0.3.3.....;. .l.o.o.k. .f.o.r. .l.a.n.g.u.a.g.e. .i.d.e.n.t.i.f.i.e.r.s. .i.n. .M.S.D.N. .-. .'.T.a.b.l.e. .o.f. .L.a.n.g.u.a.g.e. .I.d.e.n.t.i.f.i.e.r.s.'. .t.o.p.i.c.........;. .S.T.A.N.D.A.R.D. .D.I.A.L.O.G. .B.U.T.T.O.N.S.:.........1.=.O.K.....2.=.C.a.n.c.e.l.........;. .P.R.I.N.T.I.N.G. .P.R.E.F.E.R.E.N.C.E.S.:.........;. .C.o.m.m.o.n. .s.t.r.i.n.g.s.....;. .b.i.t.s. .p.e.r. .p.i.x.e.l.....5.0.0.0. .=. .1. .b.i.t. .-. .b.l.a.c.k. .a.n.d. .w.h.i.t.e.....5.0.0.1. .=. .4. .b.i.t.s. .-. .1.6. .c.o.l.o.r.s.....5.0.0.2. .=. .8. .b.i.t.s. .-. .2.5.6. .c.o.l.o.r.s.....5.0.0.3. .=. .2.4. .b.i.t.s. .-. .t.r.u.e. .c.o.l.o.r.........;. .C.o.m.p.r.e.s.s.i.o.n.....5.0.0.4. .=. .N.o.n.e.....5.0.0.5. .=. .A.u.t.o.m.a.t.i.c.....5.0.0.6. .=. .C.C.I.T.T. .m.o.d.i.f.i.e.d. .H.u.f.f.m.a.n. .R.L.E.....5.0.0.7. .=. .C.C.I.T.T. .G.r.o.u.p. .3. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.8. .=. .C.C.I.T.T. .G.r.o.u.p. .4. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.9. .=. .L.e.m.p.e.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):53056
                                                                                                                  Entropy (8bit):6.556803642202102
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:AqfYixknAt1kJSwlxeZQHPFtuEK+XLxSzELK4ZHZxBKgCu:8ixknqaxxeZ09tVr7xkyZ5ncu
                                                                                                                  MD5:A7A19BFD82EEAE7D4DC00144F3B949F4
                                                                                                                  SHA1:FBD6EF10A7D519386CB32B093AE7E42852BAECBD
                                                                                                                  SHA-256:A32A93B71A5628EDFC19FD31D26AC60DAF364E89CFDA2C82071718814042BE55
                                                                                                                  SHA-512:5AC0F6A0FDAAB8B832B0021948101ABD1C8AF8B79E0C02D60770DF22D945D669AE7D588BD3264F9991E11CBAB01A445AAC9B594B47171C68A6A7BDC3FBB8D962
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w...3..3..3..uO..1..uO.. ..uO,.7..uO..6..3..S..:fb.4.....1..>L*.2..3.f.2.../.2..Rich3..........................PE..L...j3.\.................v...:......Ez............@.................................Ul....@.................................t...x.......@...............@...............8..............................@...............|............................text....u.......v.................. ..`.rdata... ......."...z..............@..@.data...............................@....rsrc...@...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2772288
                                                                                                                  Entropy (8bit):6.917291195041145
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:UuZqJvz7GHYFVw8vfMVDpaLGtH3uSvQ/qpyr0kiU6HoCPLG5gzyUxChRebU:UuZqJvz7GHGVfvfMVDNNxvQ/qpyr0kpj
                                                                                                                  MD5:9FD469846E628F44A4147743875FFBC0
                                                                                                                  SHA1:6065C496D7C2695F3678D945FFA3FEFFBCD83C53
                                                                                                                  SHA-256:129C2D91F085E54FD9E333C6F580A16907A1D9659D823D6C7CB25F5D3CE55CC8
                                                                                                                  SHA-512:5AF5DD95BE604E039337D153CED2B9D3FE33F2E05818E3A222FDD9F7B3381197CCF3CA39324F46CA95B81DF76624F0EF4A0CF045195640E58B9A233D092F43AB
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 2%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u.&.1fH.1fH.1fH....8fH.w7..<fH.w7..<fH.w7..5fH.w7..6fH.8..$fH.1fI.^gH.1fH.&fH......dH......fH.....,fH.....0fH.<4..0fH.....0fH.Rich1fH.................PE..L...,..[...........!.........j......#......... ...............................*.....N.*...@.........................p.'..:..T.(.......)...............*.@.....).8|..0. .8............................8'.@............. .h............................text............................... ..`.rdata...-.... ....... .............@..@.data........@(..~...0(.............@....rsrc.........).......(.............@..@.reloc..8|....)..~....(.............@..B................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2991424
                                                                                                                  Entropy (8bit):6.7900679594310915
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:kz1BQT/9rrcXgJoHt3LhNSTuHo6E7hVNO8B/3LUvQ/qpyr0kRZTKjEKMUP9isAxI:kz1BI5U3lNS6Ho6E7vBRIvQ/qpyr0kuF
                                                                                                                  MD5:829DD10CD377386A2040897F5288DDB0
                                                                                                                  SHA1:A7B1C7A6C0E1C9641750E8150EE810530FB67DD0
                                                                                                                  SHA-256:5753F66DBC480901955DE247117F3C1E99777B1A610C90931E50C374F8B1D888
                                                                                                                  SHA-512:C6B915EBF7B1C023FBB2E06FB169857539253CFA2B5B5C770DF5A43896AF8A0C847796E3F82C6109778F11D7FE3976DA172E1E0E6EACCD1C82DBAEB80ADAB4F5
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 2%
                                                                                                                  Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$............j...j...j..V.u..j...;m..j...;R..j...;o..j...;S..j....!..j..}.o..j...j...j..}.R.3h..}.S..j.._4...j...j..Ah..}.W..j..}.n..j...8i..j...j%..j..}.l..j..Rich.j..........................PE..L....3.\..................!...........!......."...@...........................-.....;.....@...........................+.+.....+.......,.@.............-.@.....,..C...................................w+.@............."..............................text...g.!.......!................. ..`.rdata..$.....".......".............@..@.data....~....,..N....+.............@....rsrc...@.....,......<,.............@..@.reloc...C....,..D...B,.............@..B................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):660128
                                                                                                                  Entropy (8bit):6.339798513733826
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:N2fus43uu43Ry4GHlT4xH2K+M+/i+WSpY+7YOzCaK9A3gS2EKZm+GWodEEwnyh:muJzCaK9AB2EKZm+GWodEEwnyh
                                                                                                                  MD5:46060C35F697281BC5E7337AEE3722B1
                                                                                                                  SHA1:D0164C041707F297A73ABB9EA854111953E99CF1
                                                                                                                  SHA-256:2ABF0AAB5A3C5AE9424B64E9D19D9D6D4AEBC67814D7E92E4927B9798FEF2848
                                                                                                                  SHA-512:2CF2ED4D45C79A6E6CEBFA3D332710A97F5CF0251DC194EEC8C54EA0CB85762FD19822610021CCD6A6904E80AFAE1590A83AF1FA45152F28CA56D862A3473F0A
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;..h..h..h..[h..h..h..h..Mh..hIAWh..h..Oh..h..qh..h..ph..h..uh..h..Lh..h..Kh..h..Nh..hRich..h................PE..d.....OR.........." .....@...................................................`......a.....`.........................................pU.. ....2..<....@...........G.......>...P.......X..................................p............P...............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data........P...8...B..............@....pdata...G.......H...z..............@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):963232
                                                                                                                  Entropy (8bit):6.634408584960502
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:FkZ+EUPoH5KTcAxt/qvRQdxQxO61kCS9mmWymzVPD:FkMAlM8ixQI5C6wl
                                                                                                                  MD5:9C861C079DD81762B6C54E37597B7712
                                                                                                                  SHA1:62CB65A1D79E2C5ADA0C7BFC04C18693567C90D0
                                                                                                                  SHA-256:AD32240BB1DE55C3F5FCAC8789F583A17057F9D14914C538C2A7A5AD346B341C
                                                                                                                  SHA-512:3AA770D6FBA8590FDCF5D263CB2B3D2FAE859E29D31AD482FBFBD700BCD602A013AC2568475999EF9FB06AE666D203D97F42181EC7344CBA023A8534FB13ACB7
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ck.."..".."..D...".."..-"...s..$ ...s.."...s.."...s.. "...s.."...s.."...s.."..Rich."..........................PE..d.....OR.........." .....h...:.......)..............................................].....`.................................................@...(............@...s...t...>......8...p................................2..p............................................text....g.......h.................. ..`.rdata...8.......:...l..............@..@.data...hu.......D..................@....pdata...s...@...t..................@..@.rsrc................^..............@..@.reloc..8............b..............@..B........................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Windows setup INFormation
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):9698
                                                                                                                  Entropy (8bit):3.8395767056459316
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:jxUPudWfG9sPEd5yVplXhzPGeQ6cGIDGzBs+2o5WcicJXoNaTXy:jyxFeGIDIFXoNT
                                                                                                                  MD5:6476F7217D9D6372361B9E49D701FB99
                                                                                                                  SHA1:E1155AB2ACC8A9C9B3C83D1E98F816B84B5E7E25
                                                                                                                  SHA-256:6135D3C9956A00C22615E53D66085DABBE2FBB93DF7B0CDF5C4F7F7B3829F58B
                                                                                                                  SHA-512:B27ABD8ED640A72424B662AE5C529CDDA845497DC8BD6B67B0B44AE9CDD5E849F627E1735108B2DF09DD6EF83AD1DE6FAA1AD7A6727B5D7A7985F92A92CA0779
                                                                                                                  Malicious:false
                                                                                                                  Preview:..............;. .N.T.P.R.I.N.T...I.N.F. .(.f.o.r. .W.i.n.d.o.w.s. .S.e.r.v.e.r. .2.0.0.3. .f.a.m.i.l.y.).....;.....;. .L.i.s.t. .o.f. .s.u.p.p.o.r.t.e.d. .p.r.i.n.t.e.r.s.,. .m.a.n.u.f.a.c.t.u.r.e.r.s.....;.........[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.i.n.d.o.w.s. .N.T.$.".....P.r.o.v.i.d.e.r.=.".M.i.c.r.o.s.o.f.t.".....C.l.a.s.s.G.U.I.D.=.{.4.D.3.6.E.9.7.9.-.E.3.2.5.-.1.1.C.E.-.B.F.C.1.-.0.8.0.0.2.B.E.1.0.3.1.8.}.....C.l.a.s.s.=.P.r.i.n.t.e.r.....C.a.t.a.l.o.g.F.i.l.e.=.n.t.p.r.i.n.t...c.a.t.....D.r.i.v.e.r.I.s.o.l.a.t.i.o.n.=.2.....D.r.i.v.e.r.V.e.r.=.0.6./.2.1./.2.0.0.6.,.6...1...7.6.0.0...1.6.3.8.5.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....".M.i.c.r.o.s.o.f.t.".=.M.i.c.r.o.s.o.f.t.,.N.T.a.m.d.6.4.........[.M.i.c.r.o.s.o.f.t...N.T.a.m.d.6.4.].....".{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.E.7.9.F.0.}.". .=. .{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.E.7.9.F.0.}.,. .{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):10134
                                                                                                                  Entropy (8bit):5.364629779133003
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:75LkqDCmLVf89uqywWrvNCB4isySOc3AOv2B+YT1/44tuU+3:1OmLVf4dErvNCB5tSOc3AY2BP944g
                                                                                                                  MD5:6F70BD62A17EC5B677EC1129F594EE6F
                                                                                                                  SHA1:4FB95EB83A99C0DA62919C34886B0A3667F3911E
                                                                                                                  SHA-256:FC8570D50C1773A1B34AA4E31143FD0776E26FF032EE3EEB6DB8BFAB42B4A846
                                                                                                                  SHA-512:615A7E8738B2CF1BC47C8D5FC1357C1299080D0BAA1E54129D0DEBDB6BA60CD366364BE0BDAFDABCBA60F16544B0516A50B4B0182E8BCF01F59171003CE9B244
                                                                                                                  Malicious:false
                                                                                                                  Preview:...... ..........f...........(...N... ..........v...........h....... .... ............... .h....#..(... ...@.....................................................................................................................................................x..............wx.............ww.............ww.x...........ww.xx..........ww.wxx..........w.wwxx...........wwwxx..........xwwwxx..........xwwwx...........xwww..x.........xww.wx.x........xw.wwwx.x.......x.w|.x.x.x........z.x.ww..x......x.x.ww....x......x..w....x.x......x.....p.x........x................x....................p................................p..........................................................................................................................................................................................................?...........?............(....... ..........................................................................................................x......w......w.x......wx.....wwx.....w
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):17415
                                                                                                                  Entropy (8bit):4.618177193109944
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:U1EQCr2g2t2g2F2s2J2m2p2z2ZOgoNJUTIZah25Dy:3oLILwfcV86ZO3eTIZzy
                                                                                                                  MD5:8EE7FD65170ED9BD408E0C821171B62A
                                                                                                                  SHA1:9D14A87A049C3B576CEC4B28210F0C95B94E08E0
                                                                                                                  SHA-256:EE1E4D9869188CC3FA518C445ECF071845E5BD8BE56767A9F7F7DD3ACE294BA5
                                                                                                                  SHA-512:5740AB3545D2217BA2156C58BA9AF6681D73116AB5DFBEAA5AB615D9CD0C77716C25865E67188E9D7892B340776755D4CBB1A3E98FAEAF8B6BB4B2CCA00D8AE6
                                                                                                                  Malicious:false
                                                                                                                  Preview:*GPDSpecVersion: "1.0"..*GPDFileVersion: "1.0"..*GPDFileName: "***.GPD"..*Include: "STDNAMES_VPD.GPD"..*ModelName: "****"..*MasterUnits: PAIR(40800, 117600)..*ResourceDLL: "UNIRES_VPD.DLL"..*PrinterType: PAGE..*MaxCopies: 99....*Feature: Orientation..{.. *rcNameID: =ORIENTATION_DISPLAY.. *DefaultOption: PORTRAIT.. *Option: PORTRAIT.. {.. *rcNameID: =PORTRAIT_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.6.. *Cmd: "".. }.. }.. *Option: LANDSCAPE_CC270.. {.. *rcNameID: =LANDSCAPE_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.6.. *Cmd: "".. }.. }..}..*Feature: InputBin..{.. *rcNameID: =PAPER_SOURCE_DISPLAY.. *DefaultOption: AUTO...*Option: AUTO.. {.. *rcNameID: =AUTO_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.9.. *Cmd: "".. }.. }.. *Option: CASSETTE.. {.. *rcNameID:
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):41
                                                                                                                  Entropy (8bit):4.479503224130278
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:z8ANyq3jII7Vc:z8cy2lc
                                                                                                                  MD5:035B163A3E4C308F617C05E0137FAFD0
                                                                                                                  SHA1:484238C9C05805F1CA5A97FA58950253B7F9FCBE
                                                                                                                  SHA-256:00CA9230DBAC7FF222CA837AA796496FF4B9B15E0552D3D5AD26B040E2BAB8D7
                                                                                                                  SHA-512:3EB65CF86C3C71944C8100F90C60604DB4EA69CB187F8E473601845EB4520148CF3779762EF997DC5C14FE8A2269B928448DDF0338A4F172C0460FA0D6F29798
                                                                                                                  Malicious:false
                                                                                                                  Preview:[OEMFiles] ..OEMConfigFile1=rppdui.dll ..
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):98650
                                                                                                                  Entropy (8bit):4.192473934109759
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:5rENOwVRq6rZmor3CmRxhESLGZ0s1JP2PY6rZIshvwmE2uJJ6rZqDJK1YRo6rZGx:S9miFao0WDn
                                                                                                                  MD5:1614E6CDF119FD284D476F7E6723B3AD
                                                                                                                  SHA1:3FF9164C9E5FC47169CC1C6EECA22AAB099F2EA3
                                                                                                                  SHA-256:C8DF350F95FFEEED30060092DC8666EADCE040A4DDCB98E7A9293F87D19387A8
                                                                                                                  SHA-512:8FBCB156B2F9637BC15FA71758A361CB2500F5A19875EE6BE2B52FC3171C38353A6CDC623E36777D052E0B319C7AF934D2D1DBE92E69666C9B9AD749610BA471
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.E.n.g.l.i.s.h.].....L.a.n.g.I.D.=.1.0.3.3.....;. .l.o.o.k. .f.o.r. .l.a.n.g.u.a.g.e. .i.d.e.n.t.i.f.i.e.r.s. .i.n. .M.S.D.N. .-. .'.T.a.b.l.e. .o.f. .L.a.n.g.u.a.g.e. .I.d.e.n.t.i.f.i.e.r.s.'. .t.o.p.i.c.........;. .S.T.A.N.D.A.R.D. .D.I.A.L.O.G. .B.U.T.T.O.N.S.:.........1.=.O.K.....2.=.C.a.n.c.e.l.........;. .P.R.I.N.T.I.N.G. .P.R.E.F.E.R.E.N.C.E.S.:.........;. .C.o.m.m.o.n. .s.t.r.i.n.g.s.....;. .b.i.t.s. .p.e.r. .p.i.x.e.l.....5.0.0.0. .=. .1. .b.i.t. .-. .b.l.a.c.k. .a.n.d. .w.h.i.t.e.....5.0.0.1. .=. .4. .b.i.t.s. .-. .1.6. .c.o.l.o.r.s.....5.0.0.2. .=. .8. .b.i.t.s. .-. .2.5.6. .c.o.l.o.r.s.....5.0.0.3. .=. .2.4. .b.i.t.s. .-. .t.r.u.e. .c.o.l.o.r.........;. .C.o.m.p.r.e.s.s.i.o.n.....5.0.0.4. .=. .N.o.n.e.....5.0.0.5. .=. .A.u.t.o.m.a.t.i.c.....5.0.0.6. .=. .C.C.I.T.T. .m.o.d.i.f.i.e.d. .H.u.f.f.m.a.n. .R.L.E.....5.0.0.7. .=. .C.C.I.T.T. .G.r.o.u.p. .3. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.8. .=. .C.C.I.T.T. .G.r.o.u.p. .4. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.9. .=. .L.e.m.p.e.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):35648
                                                                                                                  Entropy (8bit):6.365966080243848
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:nE2YHORRn1SNBaiAL3X8jARHb2Os7fAK6ncZxBKg1xDo:E862HbPs7otEnzNo
                                                                                                                  MD5:68EA0EC529B7B9D3284D860F5ABD9BB4
                                                                                                                  SHA1:1A3951538D9E79F09792C8B118F010834A6C1273
                                                                                                                  SHA-256:EE963C5960F6687789004175C3DF0098331BEBBCE992BF9C73EF9EF6ED73C1E0
                                                                                                                  SHA-512:E62D2CFCA2433F4D647A5658141D63093D75491C60D1647F41FFDE74308BDF1A512DEBCC4A4535CE6FC9DE1ACB149D135D89366FE75FC9C52AA709C8887D7A28
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........p.....................i'......i1......i6.........z....i!.............i ......i;..............i&......i#.....Rich............PE..d....4.\.........." .....V..........|P....................................................@..........................................d..W....[..................`....l..@........... ................................................................................text...'U.......V.................. ..`.data...4....p.......Z..............@....pdata..`............b..............@..@.rsrc................f..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):204096
                                                                                                                  Entropy (8bit):5.820956822859452
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:co2/UxSJBXgK5IsZsYMNV7jWCQQD9KdtvB1WOAahmRF:co284/XgGfbuYAKdf1WOAaO
                                                                                                                  MD5:126C2BCC9112266CE33F9835A1E44B9C
                                                                                                                  SHA1:B16C0D19797C7A0CC665BC8346ECF453234A83A4
                                                                                                                  SHA-256:2736C2919966D17F27A34D69A7253CD4C2D09C6F7CF9FC03597F27BC73C0BDC2
                                                                                                                  SHA-512:C25FC46CA2D8DAAD868FA2B5F1BA6CCAAC7F919C8C7CBB86952741B493D27E79EC8C7FD5F124A704B78F4197E6F3812D0FE0F64BC00117EE2AC09B41FAE85308
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$................dD....\....c....^....b..........R.......5Zf...5Zb...5Z_....X........5Z]...Rich...........................PE..d....4.\.........." .................~....................................................`..........................................G..l...\H..........(.......<.......@...............................................p............................................text...-........................... ..`.rdata..Z...........................@..@.data...ph...`.......@..............@....pdata..<............X..............@..@.rsrc...(............n..............@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):102208
                                                                                                                  Entropy (8bit):6.071111727952987
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:8Fqz3IwGZjZ8lt0nt0NhuGO7o6LJ/TJhjYEOYULzEnr:MwYrZNQCnKhnOtthUEOYULzEr
                                                                                                                  MD5:CC0E2455CFF19B3585C9FA781428E88E
                                                                                                                  SHA1:93EC9326F0CEE4E7F385525B03DDF0DF89A409E8
                                                                                                                  SHA-256:AF24B7E339CC6B80ECF7B45050533E8227D6491EED2FD8C3FF2BF22406B027AA
                                                                                                                  SHA-512:B995CD999B36B9BD3DC8BE60A7576701CB91D18DF21934521C578047CD135C91F1027058198B1867A4D46804C0514523B370ECEC0E6691A041189011E31166A6
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C.."..."..."..+.l.."...st.."...sK.."...sv.."...sJ.."...Z8.."..."..."....N.."...pp.."..."<.."....u.."..Rich."..................PE..d...)4.\.........."............................@....................................R.....`..................................................[..........x............p..@...............8............................7..p...............P............................text...=........................... ..`.rdata...g.......h..................@..@.data........p.......V..............@....pdata...............X..............@..@.rsrc................d..............@..@.reloc...............n..............@..B................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):14366
                                                                                                                  Entropy (8bit):4.1817849062232195
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:NjThm8JC986ITRCzEzEpYNwtd29u7ZTl8hF:yFzOnS7z0
                                                                                                                  MD5:7162D8977515A446D2C1E139DA59DED5
                                                                                                                  SHA1:952F696C463B8410B1FA93A3B2B6DAE416A81867
                                                                                                                  SHA-256:2835A439C6AE22074BC3372491CB71E6C2B72D0C87AE3EEE6065C6CAADF1E5C8
                                                                                                                  SHA-512:508F7CA3D4BC298534AB058F182755851051684F8D53306011F03875804C95E427428BD425DD13633EEC79748BB64E78AAD43E75B70CC5A3F0F4E6696DBB6D8E
                                                                                                                  Malicious:false
                                                                                                                  Preview:*%%% Copyright (c) 1997-1999 Microsoft Corporation..*%%% value macros for standard feature names and standard option names..*%%% used in older Unidrv's.....*CodePage: 1252 *% Windows 3.1 US (ANSI) code page....*Feature: RESDLL..{.. *Name: "resource dll files".. *ConcealFromUI?: TRUE.... *Option: UniresDLL.. {.. *Name: "unires_vpd.dll".. }..}....*Macros: StdFeatureNames..{.. ORIENTATION_DISPLAY: RESDLL.UniresDLL.11100.. PAPER_SIZE_DISPLAY: RESDLL.UniresDLL.11101.. PAPER_SOURCE_DISPLAY: RESDLL.UniresDLL.11102.. RESOLUTION_DISPLAY: RESDLL.UniresDLL.11103.. MEDIA_TYPE_DISPLAY: RESDLL.UniresDLL.11104.. TEXT_QUALITY_DISPLAY: RESDLL.UniresDLL.11105.. COLOR_PRINTING_MODE_DISPLAY: RESDLL.UniresDLL.11106.. PRINTER_MEMORY_DISPLAY: RESDLL.UniresDLL.11107.. TWO_SIDED_PRINTING_DISPLAY: RESDLL.UniresDLL.11108.. PAGE_PROTECTION_
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):487232
                                                                                                                  Entropy (8bit):6.340203111317007
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:MgjhSyqP1a/eVqxFxNCAiG3XyJ/2TxbfsEkhy+0F+K8lJrZdwwSvr:MglSTPaRxFdLXyJ/ebEEkx0rqJduJ
                                                                                                                  MD5:AD6C433A57BE03EE0C75076D6FE99CD5
                                                                                                                  SHA1:219EE785F2C8127DAA44B298B5B2B096FCCE8D12
                                                                                                                  SHA-256:8A180D92A2C879A3384D24A38EC8C9FD6BFD183935E61DA0B97F1C67A7EC9EA7
                                                                                                                  SHA-512:041FB9165068D0EA879632B883B3E247336A3BB159ED46AE053B60D074A0BB231FA2DEEDD6CB2BA17AACB771413A86A3F970480AF7A2311E51702288D3B9A30E
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................&.....7.......W.... .....0.....!.....:...d......'....."....Rich............................PE..d...w.[J.........." .........8......d..........t.....................................b....@..........................................4..........x....p.......@...(...P..@............!..8............................................0...............................text...O........................... ..`.rdata.......0......................@..@.data...x.... ......................@....pdata...(...@...*..................@..@.rsrc........p.......B..............@..@.reloc...............F..............@..B..[J@...+.[JK.....[JU.....[Jb...+.[JK.....[Jo.....[Jy...........msvcrt.dll.NTDLL.DLL.WINSPOOL.DRV.KERNEL32.dll.ole32.dll.GDI32.dll..............................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21225
                                                                                                                  Entropy (8bit):3.9923245636306675
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:g8qo9MqLEGX9WkaNWvbAsmrEGckkwy95/HLQdu:g8rMqLwkW8AsqEHkkwy7N
                                                                                                                  MD5:6798F64959C913673BD66CD4E47F4A65
                                                                                                                  SHA1:C50FAA64C8267AC7106401E69DA5C15FC3F2034C
                                                                                                                  SHA-256:0C02B226BE4E7397F8C98799E58B0A512515E462CCDAAC04EDC10E3E1091C011
                                                                                                                  SHA-512:8D208306B6D0F892A2F16F8070A89D8EDB968589896CB70CF46F43BF4BEFB7C4CA6A278C35FE8A2685CC784505EFB77C32B0AABF80D13BCC0D10A39AE8AFB55A
                                                                                                                  Malicious:false
                                                                                                                  Preview:?_...........R..r...i.....(),.aabo.utadvanc.edAllows.andareas.assigned.availabl.ebebookl.etc-.hang.e..racter@Clickc. o.de..sColo.rc.0..scon.taindefa.ultdepth.directlyi.0or..sh..PD.isplaysd.ocument.P.sdraftse.n, ex..nal.featuref.ilesfl.....PrFor..m..-.to-trayf.romgraph$ic.@sh@.to.neH.@dhig.herIfima.gesininE..atio..sta.ll.@..itLe.t..Listsl.o..*.nualm.em..meta..2mS.tM!...enhoto..Oy.w.o.per\.ngop.timizh ...@.nsor..p.......spa3.Pri.ntp.0..ed.0..0er.@-spe.cific.@s1 .m.q..ityQ.0.relaB.RET.k.ghseese.l..edsets.oftSomes0ourc}.P ed.S.@sb.'.poo...gsuchsu.pporttak.est..tha...eT..'.oTo...TrueType...l.usevie@wWhenw. e.1.rw..hwil.lyouyour.;bynewof.fs/...&....;)....z4..............................N.......|CF0.lR..|CF1..R..|CF2..R..|CF4..R..|CF5..R..|CONTEXT..)..|CTXOMAP.. ..|FONT.. ..|Petra..2..|PhrImage.....|PhrIndex.....|SYSTEM.2...|TOPIC.....|TTLBTREE..!..|TopicId.=J.......................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):892224
                                                                                                                  Entropy (8bit):6.044434154548935
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:qpvsrQZu8F/bY6Pgx2B8UNG2Ql20gcwtH2qMP23so2:kZ5F/bYogxJUB9cwtHFMDp
                                                                                                                  MD5:BB98224B0CB6F17D61AA24D7A46A08C5
                                                                                                                  SHA1:DB78D1161EAA0C691DF76D1B6D7CC98793007BCE
                                                                                                                  SHA-256:23A30F94360D710BB020DF76E7846AB991EDD6CA3C7F685AECF6CD1A019D451A
                                                                                                                  SHA-512:D74291E8556911B77588D63EB20DB5D6642C31FEDD9EE186AE62D53C705F0CDBE14725ECBB8FC5FE770F45DFF05731EEBB2063A33BB78DF70B73CDCF4E86C465
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y'..I...I...I..`...I..`...I...H.R.I..`...I..`...I..`...I..`...I...7...I..`...I..`...I.Rich..I.................PE..d.....[J.........." .....$...V.................v....................................O.....@........................................../..{.... .................../...~..@...........`...................................................0............................text...[".......$.................. ..`.data....5...@...0...(..............@....pdata.../.......0...X..............@..@.rsrc...............................@..@.reloc..0............j..............@..B..[J`...+.[Jk...5.[Ju.....[J......[J......[J....+.[Jk.....[J......[J......[J......[J............msvcrt.dll.NTDLL.DLL.RPCRT4.dll.ole32.dll.USER32.dll.KERNEL32.dll.VERSION.dll.WINSPOOL.DRV.GDI32.dll.OLEAUT32.dll...............................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):770368
                                                                                                                  Entropy (8bit):5.630939020655746
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:+kozBEoNh3bBPc/s4430ye84TF1dbua5TVhRre3kf8IKHgikinLd:SzBEGbL4Np84TQazCSiRd
                                                                                                                  MD5:A0D2853BE8043F5FC4FEE04CFE5A8293
                                                                                                                  SHA1:4FDF21E578739ABB4BCC938568F27897E733E229
                                                                                                                  SHA-256:1D8C77B674F8294DB39B2CDE2873BDE5A2F6EBD65E14CAEEB58FBA94C92C1F3D
                                                                                                                  SHA-512:FC5CE23DF55EF277D6DB898D5620697A3A061A5DD9BE63145CE71B966905CAC41B9785121709A2A0DCF8F90B76F484FAB619EB8DB40A873A867468ECF1620F99
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........u..E...E...E...Ll..D...Ll..D...RichE...................PE..d.....[J.........." ..........................@...........................................@.............................................................0...............@............................................................................................rsrc...............................@..@........................................0...8.......P.......................@...........................................r.......s...x...t...8...u.......v.......w...0...x.......y...........(...............................X.......(...............................h...............P....................................................................................................... .......8.......P.......h............................................................................................... .......0...
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):356528
                                                                                                                  Entropy (8bit):5.917051105867173
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:0g5dgFfqaKFJyHrByeUIRAHq0KzS9OAgfVgYCDlSv:0OdcUIRAHqAeX0a
                                                                                                                  MD5:BDD8AE768DBF3E6C65D741CB3880B8A7
                                                                                                                  SHA1:91B01FD48A586822C1D81CA80B950F8639CCE78C
                                                                                                                  SHA-256:602ADD77CBD807D02306DE1D0179CB71A908EECB11677116FC206A7E714AB6D6
                                                                                                                  SHA-512:7840554A66F033E556CF02772B8B3749C593657CA254E0F2DBD93B05F4600E11BA821EBA8FC038115C038B5E5AF2F8D2CF0A5AE1F1362E813CF0B5041BBBFF94
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.@.'.@.'.@....!.@.a...#.@.....&.@.a...%.@.a...*.@.a.../.@..P.. .@.'.A.T.@.a...6.@.a...&.@.a...&.@.a...&.@.Rich'.@.........PE..d...}.OR.........." .....n...........L...................................................`..............................................>...D.......P..........."...2...>...`......................................`...p............................................text....l.......n.................. ..`.rdata...............r..............@..@.data...x....`.......F..............@....pdata...".......$..................@..@minATL.......@......................@..@.rsrc........P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):455328
                                                                                                                  Entropy (8bit):6.698367093574994
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:uZ/8wcqw2oe+Z3VrfwfNOOoWhUgiW6QR7t5ss3Ooc8DHkC2e77/:W/8wVwHZFTwFOOos3Ooc8DHkC2e77/
                                                                                                                  MD5:FD5CABBE52272BD76007B68186EBAF00
                                                                                                                  SHA1:EFD1E306C1092C17F6944CC6BF9A1BFAD4D14613
                                                                                                                  SHA-256:87C42CA155473E4E71857D03497C8CBC28FA8FF7F2C8D72E8A1F39B71078F608
                                                                                                                  SHA-512:1563C8257D85274267089CD4AEAC0884A2A300FF17F84BDB64D567300543AA9CD57101D8408D0077B01A600DDF2E804F7890902C2590AF103D2C53FF03D9E4A5
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o...+.N+.N+.N.3wN).N+.N..Nm.aN(.Nm.cN#.Nm.]N..Nm.\Ne.Nm.YN-.Nm.`N*.Nm.gN*.Nm.bN*.NRich+.N........................PE..L....|OR.........."!.........................0.......................................x....@..........................W..L...<...<........................>.......D...................................K..@...............<............................text...<........................... ..`.data....^...0...0... ..............@....idata...............P..............@..@.rsrc................j..............@..@.reloc...D.......F...n..............@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):970912
                                                                                                                  Entropy (8bit):6.9649735952029515
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:LBmFyjLAOQaYkxGXPfY7eiWWcpOKnpTVOIxhK765qlRRb6x4pI23IbJQV:dmFyjLF847eiWWcoGZVOIxh/WxIAIbGV
                                                                                                                  MD5:034CCADC1C073E4216E9466B720F9849
                                                                                                                  SHA1:F19E9D8317161EDC7D3E963CC0FC46BD5E4A55A1
                                                                                                                  SHA-256:86E39B5995AF0E042FCDAA85FE2AEFD7C9DDC7AD65E6327BD5E7058BC3AB615F
                                                                                                                  SHA-512:5F11EF92D936669EE834A5CEF5C7D0E7703BF05D03DC4F09B9DCFE048D7D5ADFAAB6A9C7F42E8080A5E9AAD44A35F39F3940D5CCA20623D9CAFE373C635570F7
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S9...XlA.XlA.XlA..A.XlA.XmA.XlAQ..A.ZlAQ..AvXlAQ..A!XlAQ..A.XlAQ..A.XlAQ..A.XlAQ..A.XlARich.XlA........PE..L....|OR.........."!................D............................................... .....@.........................`........R..(....p...................>......d]..@...8...........................H...@............P...............................text............................... ..`.data...4e.......V..................@....idata.......P......................@....rsrc........p.......0..............@..@.reloc..d].......^...4..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Windows setup INFormation
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):9698
                                                                                                                  Entropy (8bit):3.8395767056459316
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:jxUPudWfG9sPEd5yVplXhzPGeQ6cGIDGzBs+2o5WcicJXoNaTXy:jyxFeGIDIFXoNT
                                                                                                                  MD5:6476F7217D9D6372361B9E49D701FB99
                                                                                                                  SHA1:E1155AB2ACC8A9C9B3C83D1E98F816B84B5E7E25
                                                                                                                  SHA-256:6135D3C9956A00C22615E53D66085DABBE2FBB93DF7B0CDF5C4F7F7B3829F58B
                                                                                                                  SHA-512:B27ABD8ED640A72424B662AE5C529CDDA845497DC8BD6B67B0B44AE9CDD5E849F627E1735108B2DF09DD6EF83AD1DE6FAA1AD7A6727B5D7A7985F92A92CA0779
                                                                                                                  Malicious:false
                                                                                                                  Preview:..............;. .N.T.P.R.I.N.T...I.N.F. .(.f.o.r. .W.i.n.d.o.w.s. .S.e.r.v.e.r. .2.0.0.3. .f.a.m.i.l.y.).....;.....;. .L.i.s.t. .o.f. .s.u.p.p.o.r.t.e.d. .p.r.i.n.t.e.r.s.,. .m.a.n.u.f.a.c.t.u.r.e.r.s.....;.........[.V.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e.=.".$.W.i.n.d.o.w.s. .N.T.$.".....P.r.o.v.i.d.e.r.=.".M.i.c.r.o.s.o.f.t.".....C.l.a.s.s.G.U.I.D.=.{.4.D.3.6.E.9.7.9.-.E.3.2.5.-.1.1.C.E.-.B.F.C.1.-.0.8.0.0.2.B.E.1.0.3.1.8.}.....C.l.a.s.s.=.P.r.i.n.t.e.r.....C.a.t.a.l.o.g.F.i.l.e.=.n.t.p.r.i.n.t...c.a.t.....D.r.i.v.e.r.I.s.o.l.a.t.i.o.n.=.2.....D.r.i.v.e.r.V.e.r.=.0.6./.2.1./.2.0.0.6.,.6...1...7.6.0.0...1.6.3.8.5.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....".M.i.c.r.o.s.o.f.t.".=.M.i.c.r.o.s.o.f.t.,.N.T.a.m.d.6.4.........[.M.i.c.r.o.s.o.f.t...N.T.a.m.d.6.4.].....".{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.E.7.9.F.0.}.". .=. .{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.E.7.9.F.0.}.,. .{.D.2.0.E.A.3.7.2.-.D.D.3.5.-.4.9.5.0.-.9.E.D.8.-.A.6.3.3.5.A.F.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):10134
                                                                                                                  Entropy (8bit):5.364629779133003
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:75LkqDCmLVf89uqywWrvNCB4isySOc3AOv2B+YT1/44tuU+3:1OmLVf4dErvNCB5tSOc3AY2BP944g
                                                                                                                  MD5:6F70BD62A17EC5B677EC1129F594EE6F
                                                                                                                  SHA1:4FB95EB83A99C0DA62919C34886B0A3667F3911E
                                                                                                                  SHA-256:FC8570D50C1773A1B34AA4E31143FD0776E26FF032EE3EEB6DB8BFAB42B4A846
                                                                                                                  SHA-512:615A7E8738B2CF1BC47C8D5FC1357C1299080D0BAA1E54129D0DEBDB6BA60CD366364BE0BDAFDABCBA60F16544B0516A50B4B0182E8BCF01F59171003CE9B244
                                                                                                                  Malicious:false
                                                                                                                  Preview:...... ..........f...........(...N... ..........v...........h....... .... ............... .h....#..(... ...@.....................................................................................................................................................x..............wx.............ww.............ww.x...........ww.xx..........ww.wxx..........w.wwxx...........wwwxx..........xwwwxx..........xwwwx...........xwww..x.........xww.wx.x........xw.wwwx.x.......x.w|.x.x.x........z.x.ww..x......x.x.ww....x......x..w....x.x......x.....p.x........x................x....................p................................p..........................................................................................................................................................................................................?...........?............(....... ..........................................................................................................x......w......w.x......wx.....wwx.....w
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):17415
                                                                                                                  Entropy (8bit):4.618177193109944
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:U1EQCr2g2t2g2F2s2J2m2p2z2ZOgoNJUTIZah25Dy:3oLILwfcV86ZO3eTIZzy
                                                                                                                  MD5:8EE7FD65170ED9BD408E0C821171B62A
                                                                                                                  SHA1:9D14A87A049C3B576CEC4B28210F0C95B94E08E0
                                                                                                                  SHA-256:EE1E4D9869188CC3FA518C445ECF071845E5BD8BE56767A9F7F7DD3ACE294BA5
                                                                                                                  SHA-512:5740AB3545D2217BA2156C58BA9AF6681D73116AB5DFBEAA5AB615D9CD0C77716C25865E67188E9D7892B340776755D4CBB1A3E98FAEAF8B6BB4B2CCA00D8AE6
                                                                                                                  Malicious:false
                                                                                                                  Preview:*GPDSpecVersion: "1.0"..*GPDFileVersion: "1.0"..*GPDFileName: "***.GPD"..*Include: "STDNAMES_VPD.GPD"..*ModelName: "****"..*MasterUnits: PAIR(40800, 117600)..*ResourceDLL: "UNIRES_VPD.DLL"..*PrinterType: PAGE..*MaxCopies: 99....*Feature: Orientation..{.. *rcNameID: =ORIENTATION_DISPLAY.. *DefaultOption: PORTRAIT.. *Option: PORTRAIT.. {.. *rcNameID: =PORTRAIT_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.6.. *Cmd: "".. }.. }.. *Option: LANDSCAPE_CC270.. {.. *rcNameID: =LANDSCAPE_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.6.. *Cmd: "".. }.. }..}..*Feature: InputBin..{.. *rcNameID: =PAPER_SOURCE_DISPLAY.. *DefaultOption: AUTO...*Option: AUTO.. {.. *rcNameID: =AUTO_DISPLAY.. *Command: CmdSelect.. {.. *Order: DOC_SETUP.9.. *Cmd: "".. }.. }.. *Option: CASSETTE.. {.. *rcNameID:
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):41
                                                                                                                  Entropy (8bit):4.479503224130278
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:z8ANyq3jII7Vc:z8cy2lc
                                                                                                                  MD5:035B163A3E4C308F617C05E0137FAFD0
                                                                                                                  SHA1:484238C9C05805F1CA5A97FA58950253B7F9FCBE
                                                                                                                  SHA-256:00CA9230DBAC7FF222CA837AA796496FF4B9B15E0552D3D5AD26B040E2BAB8D7
                                                                                                                  SHA-512:3EB65CF86C3C71944C8100F90C60604DB4EA69CB187F8E473601845EB4520148CF3779762EF997DC5C14FE8A2269B928448DDF0338A4F172C0460FA0D6F29798
                                                                                                                  Malicious:false
                                                                                                                  Preview:[OEMFiles] ..OEMConfigFile1=rppdui.dll ..
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):98650
                                                                                                                  Entropy (8bit):4.192473934109759
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:5rENOwVRq6rZmor3CmRxhESLGZ0s1JP2PY6rZIshvwmE2uJJ6rZqDJK1YRo6rZGx:S9miFao0WDn
                                                                                                                  MD5:1614E6CDF119FD284D476F7E6723B3AD
                                                                                                                  SHA1:3FF9164C9E5FC47169CC1C6EECA22AAB099F2EA3
                                                                                                                  SHA-256:C8DF350F95FFEEED30060092DC8666EADCE040A4DDCB98E7A9293F87D19387A8
                                                                                                                  SHA-512:8FBCB156B2F9637BC15FA71758A361CB2500F5A19875EE6BE2B52FC3171C38353A6CDC623E36777D052E0B319C7AF934D2D1DBE92E69666C9B9AD749610BA471
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.E.n.g.l.i.s.h.].....L.a.n.g.I.D.=.1.0.3.3.....;. .l.o.o.k. .f.o.r. .l.a.n.g.u.a.g.e. .i.d.e.n.t.i.f.i.e.r.s. .i.n. .M.S.D.N. .-. .'.T.a.b.l.e. .o.f. .L.a.n.g.u.a.g.e. .I.d.e.n.t.i.f.i.e.r.s.'. .t.o.p.i.c.........;. .S.T.A.N.D.A.R.D. .D.I.A.L.O.G. .B.U.T.T.O.N.S.:.........1.=.O.K.....2.=.C.a.n.c.e.l.........;. .P.R.I.N.T.I.N.G. .P.R.E.F.E.R.E.N.C.E.S.:.........;. .C.o.m.m.o.n. .s.t.r.i.n.g.s.....;. .b.i.t.s. .p.e.r. .p.i.x.e.l.....5.0.0.0. .=. .1. .b.i.t. .-. .b.l.a.c.k. .a.n.d. .w.h.i.t.e.....5.0.0.1. .=. .4. .b.i.t.s. .-. .1.6. .c.o.l.o.r.s.....5.0.0.2. .=. .8. .b.i.t.s. .-. .2.5.6. .c.o.l.o.r.s.....5.0.0.3. .=. .2.4. .b.i.t.s. .-. .t.r.u.e. .c.o.l.o.r.........;. .C.o.m.p.r.e.s.s.i.o.n.....5.0.0.4. .=. .N.o.n.e.....5.0.0.5. .=. .A.u.t.o.m.a.t.i.c.....5.0.0.6. .=. .C.C.I.T.T. .m.o.d.i.f.i.e.d. .H.u.f.f.m.a.n. .R.L.E.....5.0.0.7. .=. .C.C.I.T.T. .G.r.o.u.p. .3. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.8. .=. .C.C.I.T.T. .G.r.o.u.p. .4. .f.a.x. .e.n.c.o.d.i.n.g.....5.0.0.9. .=. .L.e.m.p.e.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):33600
                                                                                                                  Entropy (8bit):6.281064018328684
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:az2vV5RqtDcvnyQW7I+Ud26uiGKjzAVQjXzPishb8pe+7mNwSumexmMK6jcy:hgo7WcDGuB3Upe2m9uZxBKg3
                                                                                                                  MD5:BED53AB8B9E406D1A8D6A85924E44282
                                                                                                                  SHA1:19628BD3DE2BEF0EDC3622E4A7184162BD979040
                                                                                                                  SHA-256:E5A10A74CFC36A4DCFCC9B25573B92A37B55062153EF9120B93154DB5792B3DA
                                                                                                                  SHA-512:6F5C6945B0A982E8C94A826685158286D16173F51B10FDF1F5B9F4F93562240736A09B5F0997E995C0AF07360BACD51FA46CB8E4A3FA319519F3727FF87613E7
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 2%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......pZ.Y4;..4;..4;...4..:;..=C'.<;..=C6.9;..4;...;..=C!.7;..=C .5;..=C1.q;......5;..=C&.5;..=C#.5;..Rich4;..........PE..L...,4.\...........!.....F...........D.......`......................................a.....@.........................pU..W....M.......p...............d..@...........................................(...@...............t............................text....E.......F.................. ..`.data...\....`.......J..............@....rsrc........p.......P..............@..@.reloc...............T..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):159552
                                                                                                                  Entropy (8bit):6.178643199247813
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:VYM7lLXShoSAJzKb9P+K61JJBsJgTcqTIbMNZ3mo+aGh1G:77tK+K61vBsJKcq0bMNZPXP
                                                                                                                  MD5:F0A9D47D76E68883F04E60599EADAE6D
                                                                                                                  SHA1:8F7BB6B9E9CB70529FA4C442ABF507A2F546E6E3
                                                                                                                  SHA-256:2FAB0969C6E131834496428779A0809B97981F3E8D6FBF8A59632CB2DF783687
                                                                                                                  SHA-512:18BBD1A3899C6B2F361BFA575D50D7DA29EAEF0E1C7CB50B318CECFE3150F268C1CDF30FEB5246B9F9B5D7FE36BD4A268E06595D9D3F3D86D933F14F5C43AD43
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\.q.\.q.\.q..h..].q....._.q.....P.q.....X.q.....T.q.U...].q.\.p..q.U...K.q..V..V.q..V..D.q..V..].q.Q...].q.\...].q..V..].q.Rich\.q.........PE..L....3.\...........!.....L...N.......0.......`......................................k.....@.........................P...l...............(............P..@.......< ...................................z..@............`...............................text....J.......L.................. ..`.rdata...B...`...D...P..............@..@.data....\..........................@....rsrc...(...........................@..@.reloc..< ......."..................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):87360
                                                                                                                  Entropy (8bit):6.424955012685773
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:df1NQOOvFdve0e0ZIMhn9nA2LYK7ZOgkg6znnLnx9Inz1:/Adve07RnlhRN6znDQx
                                                                                                                  MD5:66C5F108A058B515BBDDE628384990C9
                                                                                                                  SHA1:0FBADFC5106056DFD269DF5EA532F69556CAE68F
                                                                                                                  SHA-256:8D596D33CC3962B33B46D361BBC44A8088F18C09949734F3DEC54828372426AE
                                                                                                                  SHA-512:6060EF07244385516989DF3AAD1C01E9F93B7B45A247D8D70FC5BE7A62BA96BFD22F80F0C78D178443D38796A2C7148CD3ADF4EB1A5FC430DFF5BB393492901E
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G..&...&...&....^..&...wF..&...wy..&...wD..&...wx..&...^...&...&..0&..$.|..&...tB..&...&...&..$.G..&..Rich.&..........PE..L...$4.\.....................n....................@..........................p.......C....@.................................d........@..x............6..@....P..........8...........................P...@............................................text............................... ..`.rdata...F.......H..................@..@.data...p....0......................@....rsrc........@......................@..@.reloc.......P....... ..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):14366
                                                                                                                  Entropy (8bit):4.1817849062232195
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:NjThm8JC986ITRCzEzEpYNwtd29u7ZTl8hF:yFzOnS7z0
                                                                                                                  MD5:7162D8977515A446D2C1E139DA59DED5
                                                                                                                  SHA1:952F696C463B8410B1FA93A3B2B6DAE416A81867
                                                                                                                  SHA-256:2835A439C6AE22074BC3372491CB71E6C2B72D0C87AE3EEE6065C6CAADF1E5C8
                                                                                                                  SHA-512:508F7CA3D4BC298534AB058F182755851051684F8D53306011F03875804C95E427428BD425DD13633EEC79748BB64E78AAD43E75B70CC5A3F0F4E6696DBB6D8E
                                                                                                                  Malicious:false
                                                                                                                  Preview:*%%% Copyright (c) 1997-1999 Microsoft Corporation..*%%% value macros for standard feature names and standard option names..*%%% used in older Unidrv's.....*CodePage: 1252 *% Windows 3.1 US (ANSI) code page....*Feature: RESDLL..{.. *Name: "resource dll files".. *ConcealFromUI?: TRUE.... *Option: UniresDLL.. {.. *Name: "unires_vpd.dll".. }..}....*Macros: StdFeatureNames..{.. ORIENTATION_DISPLAY: RESDLL.UniresDLL.11100.. PAPER_SIZE_DISPLAY: RESDLL.UniresDLL.11101.. PAPER_SOURCE_DISPLAY: RESDLL.UniresDLL.11102.. RESOLUTION_DISPLAY: RESDLL.UniresDLL.11103.. MEDIA_TYPE_DISPLAY: RESDLL.UniresDLL.11104.. TEXT_QUALITY_DISPLAY: RESDLL.UniresDLL.11105.. COLOR_PRINTING_MODE_DISPLAY: RESDLL.UniresDLL.11106.. PRINTER_MEMORY_DISPLAY: RESDLL.UniresDLL.11107.. TWO_SIDED_PRINTING_DISPLAY: RESDLL.UniresDLL.11108.. PAGE_PROTECTION_
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):383296
                                                                                                                  Entropy (8bit):6.650287803080611
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:yplBo/TK5C+psQzJzCSX6hjg+4GRr3CoA7f3j5G+hinZ5P31uGX7Zum8oyk7lATI:O0/djgEUhWnJ2UlxqOttoICvPn/318Sm
                                                                                                                  MD5:C3F39388BD4E6763F9734BC617388A17
                                                                                                                  SHA1:AF5B4753F99C3F115294662876D7191DC8652786
                                                                                                                  SHA-256:4D1F6A595889165B6A14B68D848C639748C9750C165BB4515CA3C3C67B4BA462
                                                                                                                  SHA-512:BD8D00461E65F156686B0FC799926897845900F072F7AC10B66387E041CC7D3810ADBFB0137E9EA7B24995A11D324707D9E0FCD699D36E62ED089F46CC5ABA58
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......w...3g..3g..3g..:.;.4g..3g...g..:.=.8g..:.<.2g..:.-..g..:.*.sg.....2g..:.:.2g..:.?.2g..Rich3g..........................PE..L...$.[J...........!................-..............m................................Z!....@....................................x.......................@...............8............................t..@.......|.......`............................text...k........................... ..`.data...............................@....rsrc...............................@..@.reloc..............................@..Bo.[J8...K.[JC.....[JP.....[J].....[Jg.....[Jq...........msvcrt.dll.WINSPOOL.DRV.KERNEL32.dll.NTDLL.DLL.ole32.dll.GDI32.dll..............................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21225
                                                                                                                  Entropy (8bit):3.9923245636306675
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:g8qo9MqLEGX9WkaNWvbAsmrEGckkwy95/HLQdu:g8rMqLwkW8AsqEHkkwy7N
                                                                                                                  MD5:6798F64959C913673BD66CD4E47F4A65
                                                                                                                  SHA1:C50FAA64C8267AC7106401E69DA5C15FC3F2034C
                                                                                                                  SHA-256:0C02B226BE4E7397F8C98799E58B0A512515E462CCDAAC04EDC10E3E1091C011
                                                                                                                  SHA-512:8D208306B6D0F892A2F16F8070A89D8EDB968589896CB70CF46F43BF4BEFB7C4CA6A278C35FE8A2685CC784505EFB77C32B0AABF80D13BCC0D10A39AE8AFB55A
                                                                                                                  Malicious:false
                                                                                                                  Preview:?_...........R..r...i.....(),.aabo.utadvanc.edAllows.andareas.assigned.availabl.ebebookl.etc-.hang.e..racter@Clickc. o.de..sColo.rc.0..scon.taindefa.ultdepth.directlyi.0or..sh..PD.isplaysd.ocument.P.sdraftse.n, ex..nal.featuref.ilesfl.....PrFor..m..-.to-trayf.romgraph$ic.@sh@.to.neH.@dhig.herIfima.gesininE..atio..sta.ll.@..itLe.t..Listsl.o..*.nualm.em..meta..2mS.tM!...enhoto..Oy.w.o.per\.ngop.timizh ...@.nsor..p.......spa3.Pri.ntp.0..ed.0..0er.@-spe.cific.@s1 .m.q..ityQ.0.relaB.RET.k.ghseese.l..edsets.oftSomes0ourc}.P ed.S.@sb.'.poo...gsuchsu.pporttak.est..tha...eT..'.oTo...TrueType...l.usevie@wWhenw. e.1.rw..hwil.lyouyour.;bynewof.fs/...&....;)....z4..............................N.......|CF0.lR..|CF1..R..|CF2..R..|CF4..R..|CF5..R..|CONTEXT..)..|CTXOMAP.. ..|FONT.. ..|Petra..2..|PhrImage.....|PhrIndex.....|SYSTEM.2...|TOPIC.....|TTLBTREE..!..|TopicId.=J.......................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):755520
                                                                                                                  Entropy (8bit):6.198681499104638
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:IlIoM3g2e9Bg7Lg3yfKDPc97QpAxuKdwSGnZGxn:IvM36KkyCLW7QCwSGon
                                                                                                                  MD5:0822EE0FF996BEB2B31EBBDD6449231B
                                                                                                                  SHA1:7DF7F4978F3C4728CAEF9F95C6EB6C0D8CF8FDAC
                                                                                                                  SHA-256:D727150FA7853748655E9CAA9F19F633E33BD191284703D6609984A64CB39CAB
                                                                                                                  SHA-512:A47D25901FAD0507167E241350EC12C8D545F3F932E1B44E5F167A82263BCB97DA06B09454E8DE815EFC445088F2B1011028C3EAE5BF3F55FACAA3D9EC082815
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......."..wf..$f..$f..$o.%$n..$f..$...$o.#$u..$o.3$8..$o."$g..$o.4$...$AZ.$g..$o.$$g..$o.!$g..$Richf..$................PE..L......L...........!.....2...2......e........@....(p.....................................@.............................{....3.......p...............h..@....`...0...@..8...............................@............................................text...E1.......2.................. ..`.data........P.......6..............@....rsrc........p.......T..............@..@.reloc...0...`...2...6..............@..B..LX......Lc...o..Ln...&..Lx.....L....n..L....%..L....K..L.......L....r..L............msvcrt.dll.RPCRT4.dll.ole32.dll.USER32.dll.KERNEL32.dll.NTDLL.DLL.VERSION.dll.WINSPOOL.DRV.GDI32.dll.OLEAUT32.dll.......................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):770368
                                                                                                                  Entropy (8bit):5.629918098777896
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:tkoGBEoNh3bBPc/s4430ye84TF1dbua5TVhRre3kf8IKHgikinLC:LGBEGbL4Np84TQazCSiRC
                                                                                                                  MD5:385152D096A96D1966C1042EDE38114F
                                                                                                                  SHA1:A42D0587A2BF156C3F757778397A2E7AC8122E3C
                                                                                                                  SHA-256:5A22FE5AF587540A9840E4F2A515564A2478DDA47AC1C81B687AC2F59C4C2FD0
                                                                                                                  SHA-512:483E8819C6C5C1BCF725A4D6513364A5EE054E1D9100A8F42FFD2DBBFD52910CCA8E6DAF4435103C75AA2EBCA5A608BCC76EE6C531EA67C723267D9445D40256
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........u..E...E...E...Ll..D...Ll..D...RichE...................PE..L......L...........!..............................@.......................................@............................................................@............................................................................................rsrc...............................@..@........................................................0...8.......P.......................@...........................................r.......s...x...t...8...u.......v.......w...0...x.......y...........(...............................X.......(...............................h...............P....................................................................................................... .......8.......P.......h............................................................................................... .......0...
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):247984
                                                                                                                  Entropy (8bit):6.601853231729306
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:+SsS5fv6EATwqlGwyfDyodYI3ZubfW5nb2PQuW0x:+I5fv6EATwqlGwyfDyodYI3Zv1C
                                                                                                                  MD5:69837E50C50561A083A72A5F8EA1F6A2
                                                                                                                  SHA1:1A4B4C6C3CB6A5164CC1018AC72D0300455B3D8F
                                                                                                                  SHA-256:9C9D4E421C55F7EF4E455E75B58A6639428CCD75C76E5717F448AFE4C21C52BC
                                                                                                                  SHA-512:FD20C6B4EEC972C775681AD7322769D5074108D730727051EF77D779A277D77B12419E1FEE1E2EC0CF376A235573A85AD37975245DBF078DE467953AFD02164A
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0p..Q..Q..Q..)..Q......Q......Q......Q......Q..P...Q..Q...Q......Q......Q......Q......Q..Rich.Q..........PE..L....OR.........."!.................4...............................................:....@.............................e=...A.......`...................>...p...R..0................................/..@............@...............................text............................... ..`.data...xp.......n..................@....idata.......@......."..............@..@minATL.......P.......0..............@..@.rsrc........`.......2..............@..@.reloc...R...p...T...6..............@..B........................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):52312
                                                                                                                  Entropy (8bit):6.450469916547452
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:MsmrWdCS5PvBHOUYTKJgr0OMpqdBwFrGjYBZyIh9rOQ:Mza/pu/TKJ/OMpTryYzyMCQ
                                                                                                                  MD5:4E84DF6558C385BC781CDDEA34C9FBA3
                                                                                                                  SHA1:6D63D87C19C11BDBFA484A5835FFFFD7647296C8
                                                                                                                  SHA-256:0526073F28A3B5999528BFA0E680D668922499124F783F02C52A3B25C367EF6D
                                                                                                                  SHA-512:C35DA0744568BFFFEFF09E6590D059E91E5D380C5FEB3A0FBC5B19477CECA007A882884A7033345CE408FCE1DEAC5248AD9B046656478D734FE494B787F8A9F2
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...r.;`.....................$...................@..........................`....................................... ..q............P..................X....@..................................................................$....................text............................... ..`.itext.............................. ..`.data...<...........................@....bss.....5...............................idata..............................@....didata.$...........................@....edata..q.... ......................@..@.rdata..E....0......................@..@.reloc.......@......................@..B.rsrc........P......................@..@.............`......................@..@........................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):9223040
                                                                                                                  Entropy (8bit):6.355581719432468
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:196608:vL7NqnDg0293wsNAXayRDfxihAYOjPTJ3kx+q8ZJPyv1wbl3bc2EeJUO9WLcb0K:9lOJDm1Wrc2EeJUO9WLcbN
                                                                                                                  MD5:8A9BDA9B9A84BD1551A09B65DFBC0C74
                                                                                                                  SHA1:14FB48758D664917D789C21DCCB26D9D987F099F
                                                                                                                  SHA-256:1D0F8C96F77C339A5F01822B9375131B0B0A49D6CAC45589CDB4B749DAA79773
                                                                                                                  SHA-512:BBFB78B3652532E97F66E2DE7BFBEEFCB59254D9E626C62FF1B2E735AF2549B5483AB07739F6C9A686304C5042CDA79312028293959500BAC2A1EFE91B7732DB
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=..f..i.t......!...*.~G...e..0............G...(m..........................j..........@... ......................Pc......`c.0"....c.............x..../....c............................`.S.....................|ec..............................text....}G......~G.................`..`.data...,o....G..p....G.............@....rdata........H..0....G.............@..@/4...........0U......$U.............@..@.bss......... c..........................edata.......Pc.......c.............@..@.idata..0"...`c..$....c.............@....CRT....0.....c......8c.............@....tls..........c......:c.............@....rsrc.........c......<c.............@..@.reloc.......c......@c.............@..B/14..........`f.......e.............@..B/29..........pf.......e.............@..B/41......b...0h..d....g.............@..B/55...........h.......g.............@..B/67..........`i.......h.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):7137640
                                                                                                                  Entropy (8bit):6.481515443983134
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:98304:ZRE7yGktThDyt6666666666666666666666666666666x666666666666666fww8:XGktThD0TGh/fTCRwlRvZG3XYBVX1
                                                                                                                  MD5:0DF9039CE4896584A206A40F48A07C6A
                                                                                                                  SHA1:34F0F9AEFD5E37B6B02D062B8AB967DC0F3D2F21
                                                                                                                  SHA-256:1DDE27F0410E59561EAB79A6C8EF6DF2ACEC52E92C9AC646135CD91940F2BE05
                                                                                                                  SHA-512:FCF74DD6BF3491D2E56A963ABF028EDA8DF17C11ABB793E6E3DAAD3C1E6C1AEE2F731B23CE243872B588CDF7B1B6382804F6B5204DFFC04F266BE3A329945FA4
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..f..T.i......!...*.(E..*Q..:...........@E...0g..........................U.....7.m...@... ......................`P......pP.......P.............`.l../....P..#...........................FH......................rP.L............................text...`.E.......E.................`..`.rodata.@....0E......$E............. ..`.data...,(...@E..*....E.............@....rdata.......pE......XE.............@..@/4......L.....I.......H.............@..@.bss....X9... P..........................edata.......`P.......O.............@..@.idata.......pP.......O.............@....CRT....0.....P.......P.............@....tls..........P.......P.............@....rsrc.........P.......P.............@..@.reloc...#....P..$....P.............@..B/14...........Q......:Q.............@..B/29...........Q......BQ.............@..B/41......Y....S..Z....R.............@..B/55...........S......(S.
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):11132168
                                                                                                                  Entropy (8bit):6.740943395722077
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:196608:kngOxqtJKXthIbi0EFrJIj35fGsX1bdXtK:kgOxqtQOUJ85jFhXQ
                                                                                                                  MD5:CB9BE257064162076EBD4869CD97E166
                                                                                                                  SHA1:49A8CACD48036784A413D63A242ED178BD75CBE9
                                                                                                                  SHA-256:8A3822D52B4D460430B9E8E0FA6E6BD2C458598E4DBC2529DF7F2BDF902D2DD2
                                                                                                                  SHA-512:013B7E7CCC77531C0D6FA81083B2F16CD0A2B2124105B2F855A478F1F114D3DBA75259B82596645E6BABD91E129E7F7F60AA85ECA32BD95F454B1A8A63B52EFB
                                                                                                                  Malicious:true
                                                                                                                  Yara Hits:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, Author: Joe Security
                                                                                                                  • Rule: MALWARE_Win_RemoteUtilitiesRAT, Description: RemoteUtilitiesRAT RAT payload, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, Author: ditekSHen
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 13%
                                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f.................H...b#.....DW.......`....@.................................!....@......@..............................RX...@..|................/.......v......................................................t........w...................text............................. ..`.itext...X.......Z................. ..`.data...\....`.......L..............@....bss....................................idata..RX.......Z.................@....didata..w.......x...4..............@....edata..............................@..@.tls....h................................rdata..]...........................@..@.reloc...v.......v..................@..B.rsrc...|....@.......&..............@..@....................................@..@................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21764872
                                                                                                                  Entropy (8bit):6.6100525724973656
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:393216:KEpVg+4nw7m2R8VLgZDMwyA7FWBdlY74ZV:tZR8VLg8AGYs
                                                                                                                  MD5:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  SHA1:710C0369915390737ED9BC19252F517D2D2939ED
                                                                                                                  SHA-256:DE0FA71C1CFF03D657CB65A86072E964060C628AA4EB709CBE914DD772EF298D
                                                                                                                  SHA-512:219D6307697CB12FA56020E6B2DC8FF5D13904FD318E2ED3646B294FAA1A613D838D0350E59B911023EA6F6D62CE53E402F975CAD4311D9A7DA58BD675AE2DB6
                                                                                                                  Malicious:true
                                                                                                                  Yara Hits:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, Author: Joe Security
                                                                                                                  • Rule: MALWARE_Win_RemoteUtilitiesRAT, Description: RemoteUtilitiesRAT RAT payload, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, Author: ditekSHen
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f.................4....R.....<N.......P....@..........................`X.......L...@......@...............................b....!.8X7...........K../...0..`............................ ...............................p..:....................text............................... ..`.itext..`........................... ..`.data........P.......8..............@....bss.....................................idata...b.......d..................@....didata.:....p.......8..............@....edata..............................@..@.tls....h................................rdata..].... ......................@..@.reloc..`....0......................@..B.rsrc...8X7...!..Z7.................@..@..............G.......:.............@..@................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):388696
                                                                                                                  Entropy (8bit):6.639766301981685
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:YIIDyjBnydesbWoiwS7dVIclCzoqHO/gCaEkkH8TuX6RTrWD4siZMZ+LG4IPWwc8:YI8tiDOzyH9H8Tu6h04fZMZoMPuvfj0h
                                                                                                                  MD5:E247666CDEA63DA5A95AEBC135908207
                                                                                                                  SHA1:4642F6C3973C41B7D1C9A73111A26C2D7AC9C392
                                                                                                                  SHA-256:B419ED0374E3789B4F83D4AF601F796D958E366562A0AAEA5D2F81E82ABDCF33
                                                                                                                  SHA-512:06DA11E694D5229783CFB058DCD04D855A1D0758BEEAA97BCD886702A1502D0BF542E7890AA8F2E401BE36CCF70376B5C091A5D328BB1ABE738BC0798AB98A54
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................g......"............#.O...T8.....T8..................T8.....'....................Rich............................PE..L...v..T...........!..... ...........2.......0......................................A...............................@q.......q..........................X........(...1..8............................U..@............0...............................text............ .................. ..`.rdata...J...0...L...$..............@..@.data...H>...........p..............@....rodata.............................@..@.rsrc...............................@..@.reloc...(.......*..................@..B........................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1640536
                                                                                                                  Entropy (8bit):6.686577023894573
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:OSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSvSSSSSSSSSSSSSSSlwwwwwwwwwwwwww3:OSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSZ
                                                                                                                  MD5:D5C2A6AC30E76B7C9B55ADF1FE5C1E4A
                                                                                                                  SHA1:3D841EB48D1A32B511611D4B9E6EED71E2C373EE
                                                                                                                  SHA-256:11C7004851E6E6624158990DC8ABE3AA517BCAB708364D469589AD0CA3DBA428
                                                                                                                  SHA-512:3C1C7FB535E779AC6C0D5AEF2D4E9239F1C27136468738A0BD8587F91B99365A38808BE31380BE98FD74063D266654A6AC2C2E88861A3FE314A95F1296699E1D
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:J<A[$oA[$oA[$o...o@[$o...o.[$o...op[$o...o.[$o...oC[$o...oL[$oA[%o.[$oA[$op[$o...o@[$oL..o.[$oL..o@[$oL..o@[$oL..o@[$oRichA[$o................PE..L...}..T...........!.........>.......*..............................................5.......................................(............7..............X..............................................@............................................text............................... ..`.rdata..............................@..@.data...$r......."..................@....rodata.............................@..@.rsrc....7.......8...0..............@..@.reloc..............h..............@..B................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):265816
                                                                                                                  Entropy (8bit):6.521007214956242
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:MW218gr7s2yIHB0pTPdTX9zUbEbStE97zjAs1RtTcJTfIv0se7POWu/HgsGU1VTl:MWSfr7sXSmPDbKPJ6/AsNk+1x
                                                                                                                  MD5:49C51ACE274D7DB13CAA533880869A4A
                                                                                                                  SHA1:B539ED2F1A15E2D4E5C933611D736E0C317B8313
                                                                                                                  SHA-256:1D6407D7C7FFD2642EA7F97C86100514E8E44F58FF522475CB42BCC43A1B172B
                                                                                                                  SHA-512:13440009E2F63078DCE466BF2FE54C60FEB6CEDEED6E9E6FC592189C50B0780543C936786B7051311089F39E9E3CCB67F705C54781C4CAE6D3A8007998BEFBF6
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@~..!..!..!...p...!...p..!...p..+!..M...!..M...!..!...!..M...!..s..!..s..!..s..!..s..!..Rich.!..................PE..L...{..T...........!.........N.......k.......................................0..............................................4...x.......................X......../..................................Ha..@...............l............................text............................... ..`.rdata..v...........................@..@.data....B......."..................@....rsrc...............................@..@.reloc.../.......0..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):373336
                                                                                                                  Entropy (8bit):6.7704943019914845
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:faoH9sDRlDLD0GDkEp00tc6TKUOmrRK1jRsAOO04sAO88RtOd:noPH0GgEp0gVd1ValsQXsHOd
                                                                                                                  MD5:EDA07083AF5B6608CB5B7C305D787842
                                                                                                                  SHA1:D1703C23522D285A3CCDAF7BA2EB837D40608867
                                                                                                                  SHA-256:C4683EB09D65D692CA347C0C21F72B086BD2FAF733B13234F3A6B28444457D7D
                                                                                                                  SHA-512:BE5879621D544C4E2C4B0A5DB3D93720623E89E841B2982C7F6C99BA58D30167E0DD591A12048ED045F19EC45877AA2EF631B301B903517EFFA17579C4B7C401
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Mm..,...,...,...}...,...}...,...}...,.......,.......,...,..,.......,...~...,...~...,...~...,...~...,..Rich.,..........................PE..L...t..T...........!................b.....................................................@..........................M......@N..d.......0...............X.......d&..................................p/..@...............T............................text...=........................... ..`.rdata...E.......F..................@..@.data...|<...`.......H..............@..._RDATA...............d..............@..@.rsrc...0............j..............@..@.reloc..d&.......(...n..............@..B........................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):880216
                                                                                                                  Entropy (8bit):5.239371133407635
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:vTAPYZEyRr+NDnaLyx2lz8MSjtX08pYRc29qcQmsGahsQZsbRN9S:YYF+Eyx2lzujtEIYRc1cQmsGa7ON9S
                                                                                                                  MD5:642DC7E57F0C962B9DB4C8FB346BC5A7
                                                                                                                  SHA1:ACEE24383B846F7D12521228D69135E5704546F6
                                                                                                                  SHA-256:63B4B5DB4A96A8ABEC82B64034F482B433CD4168C960307AC5CC66D2FBF67EDE
                                                                                                                  SHA-512:FB163A0CE4E3AD0B0A337F5617A7BF59070DF05CC433B6463384E8687AF3EDC197E447609A0D86FE25BA3EE2717FD470F2620A8FC3A2998A7C3B3A40530D0BAE
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A....u...u...u..C$G.3u..C$y.Iu..C$x..u...V..u...S..u...u..ju...H..u...'}.&u...'D..u...'C..u...'F..u..Rich.u..........................PE..L...s..T...........!.........R..............0......................................:W....@.........................`...........d....P..p............R..X....`...D......................................@............0..T............................text...}........................... ..`.rdata.......0......."..............@..@.data...|<..........................@..._RDATA.......@......................@..@.rsrc...p....P......................@..@.reloc...D...`...F..................@..B........................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):8192
                                                                                                                  Entropy (8bit):0.363788168458258
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ
                                                                                                                  MD5:0E72F896C84F1457C62C0E20338FAC0D
                                                                                                                  SHA1:9C071CC3D15E5BD8BF603391AE447202BD9F8537
                                                                                                                  SHA-256:686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3
                                                                                                                  SHA-512:AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251
                                                                                                                  Malicious:false
                                                                                                                  Preview:*.>...........&.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................&.............................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1310720
                                                                                                                  Entropy (8bit):1.310775528690904
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrN:KooCEYhgYEL0In
                                                                                                                  MD5:81CBD436C2F03A3DC0AAC6035832C440
                                                                                                                  SHA1:CAF3A1D67E7BC21F4B345286101914415200C2A4
                                                                                                                  SHA-256:A77DC3D033841D189E456486845B2E91A84BB78C22EF081614839F81E9121211
                                                                                                                  SHA-512:BC5F99F03BC7239540C08C4DD974A781F8C3A76DD59652B3E962810E0AD2E47F98839E4834CB1C717D1339A4B633B669FF3C3A120CAB8EFE731F8B1DFA8EEA8B
                                                                                                                  Malicious:false
                                                                                                                  Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9425059e, page size 16384, Windows version 10.0
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1310720
                                                                                                                  Entropy (8bit):0.4221866955781106
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:PSB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+ku4/Iw4KKazAkUk1k2DO:Pazag03A2UrzJDO
                                                                                                                  MD5:7C574604FDCA24265721E3C1AC67710E
                                                                                                                  SHA1:DB147CC35D6AA0545637DFC8B039A88F6E76F6F0
                                                                                                                  SHA-256:6154E4AAF19165193B119577DD0B41DBE65DEC30D1E4BBCBD1D0540663FE9A58
                                                                                                                  SHA-512:B4C363EA84E33CC9290EC179DAC14DC751EB0C8A2A91A077D23D2D6CEB1AF6F4BE35872F691EA88870B0B3C3F317F198F4F2A9113037B3A9A98AE49C007AD29C
                                                                                                                  Malicious:false
                                                                                                                  Preview:.%..... .......Y.......X\...;...{......................n.%......1...|.../...|O.h.#......1...|..n.%.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{...................................`.%.1...|....................g..1...|...........................#......n.%.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):16384
                                                                                                                  Entropy (8bit):0.07837600495308718
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:nzlsetYeTss/Opym11W3c/Ci/illOE/tlnl+/rTc:PzTssTW4c6iepMP
                                                                                                                  MD5:A6AFC8FEB1596B97CF1D20C5FD55145F
                                                                                                                  SHA1:F764799167E56D32F3DFA7B370FA2B9903877515
                                                                                                                  SHA-256:EAFF64714D4C588BF1DAF92791D64F4954291F56D7B3F2E1C092CF110695ECA2
                                                                                                                  SHA-512:64CEEC501DE8069D840546D5E22BDF248F16D2E474CE006FB45B7B3F8EE9D7DCC7FAA3B18C57137F1993A3FBDBA99BD5D350336DDE25236C9F1B278A9115CB5C
                                                                                                                  Malicious:false
                                                                                                                  Preview:b........................................;...{.../...|O..1...|...........1...|...1...|.......1...|....................g..1...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:HTML document, ASCII text, with CR line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2994
                                                                                                                  Entropy (8bit):5.463034075893661
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:SpiroU8xNqcoYERDML6RLi7rNRLigbqNKKkdgmtoZh3AijHFutX3:lr0xccoJxML6RLidRLi1ongBAiju
                                                                                                                  MD5:2B67ECBC6A00C19403FB52DF4E21EF45
                                                                                                                  SHA1:4C6A2F4EC85C34540ACCD84AC60AFFC7157996DA
                                                                                                                  SHA-256:BBCE6F04539BE22066117F79F5376AA39A4FA8AA373063C165E210469366043A
                                                                                                                  SHA-512:EEBB4102DB4972DCD5A86B1091AAF1868BED501FA4640F4875B81EADD40F7546368FAF09DC77976C78C0C3D62DC06FBDAD31F08AD75D42B9CD601015802AE13E
                                                                                                                  Malicious:false
                                                                                                                  Preview:<head>.<meta http-equiv="content-type" content="text/html; charset=utf-8" />.<meta name="copyright" content="TektonIT" />.<meta name="description" content="Remote Manipulator System - Server software, event log. Tektonit.com" />.<title>RMS &ndash; host log</title>.<style type="text/css">.body {.font-family: Courier New, monospace;.font-size: 100%;.background-color: #FFFFFF;.} .h1 {.font-size: 130%;.margin: 0px 0px 0px 0px;.} .textarea {.display: none;.margin-top: 5px;.width: 100%;.} ..main_table td {.border: 1px dashed #DADADA;.} ..e_l_0 {.background-color: #4c4cff;.border: 1px solid red;.} ..e_l_1 {.background-color: #fff04c;.border: none;.} ..e_l_2 {.background-color: #ffa94c;.border: none;.} ..e_l_3 {.background-color: #fc2727;.border: none;.} .#log_header td {.font-weight: bold;.} .#subheader {.font-size: 70%;.color: #DADADA;.margin-bottom: 10px;.} .</style>.<script language="javascript">.function show_textarea(elem) {.var parent_node = elem.parentNode;.var nodes = parent_node.chil
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):333
                                                                                                                  Entropy (8bit):5.0069053834575366
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:oP21LmKRL/9P21Ldd/ao9P21LhHujHO7eVVP21LwmnXjKV9P21LOLGeXkRLNWy:oP21fjP21DSo9P219Be/P21RTiP216r+
                                                                                                                  MD5:FCF5BD2986E6F4A894B9424E679E34A2
                                                                                                                  SHA1:79ACBF65AA21E8AD82EB0A9D91395C61CE7AF90F
                                                                                                                  SHA-256:8155167C3E0E44BBB3DEFA4BAD37531436E109BA4D62A3F3E472FB52B02285B0
                                                                                                                  SHA-512:DC46EF6C338FA7FE80CE3406581DE3F29200A07103DEB96110322CF694E83C8DD90B2C81824076E93FADC7B56584215290611218DE2C1C9EBC260F322E4CAA85
                                                                                                                  Malicious:false
                                                                                                                  Preview:03-12-2024_06:47:12#T:SilentInstall: installation 70270..03-12-2024_06:47:12#T:SilentInstall: NTSetPrivilege:SE_DEBUG_NAME:false. OK..03-12-2024_06:47:12#T:SilentInstall: OpenService: service not found_1. OK..03-12-2024_06:47:12#T:SilentInstall: CreateService. OK..03-12-2024_06:47:12#T:SilentInstall: finished (installation) 70270..
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe
                                                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: RMS - Host 7.2, Comments: This installer contains the logic and data to install RMS - Host 7.2, Keywords: Installer,MSI,Database, Subject: RMS - Host 7.2, Author: TektonIT, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Thu Jul 18 02:24:09 2024, Create Time/Date: Thu Jul 18 02:24:09 2024, Last Printed: Thu Jul 18 02:24:09 2024, Revision Number: {134AA6F2-2A49-44F2-A7A5-B7B9233956FA}, Code page: 1251, Template: Intel;1049
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26864640
                                                                                                                  Entropy (8bit):7.924911310016854
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:393216:3fWbJGFHH0km5pmwUs1211e50MRZDzPHPRn9xrUVaWILZPLM4ShshVK6KZ478Qic:3fRLmf21sq8P50dILZPLzVK6D
                                                                                                                  MD5:24F15E659ECB67862F4C6E72726BFCA7
                                                                                                                  SHA1:75D90172D7A315A31A484629DC8573367F3E544A
                                                                                                                  SHA-256:F11C06F1FD567E26FB4CE9999749516B6E47ADE4EE0B7B875A75A5CBFB74DC04
                                                                                                                  SHA-512:913C9FB7FDCA7F9F7DD7077C34092E76E42D88802406C9A5F6E8AA0C21E4F21FEE850A39B95982EFE9ED4A2D022A95C30739CC20DC65F3C6722B6022D8F76B3C
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...................................8........6........................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5..........;................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...A...M...:...<.......=.......?...@...T...B...C...D...E...F...G...H...I...J...O...L...N...n.......P...Q...R...U...........Z...W...X...Y.......[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):338
                                                                                                                  Entropy (8bit):3.4557019111652925
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:kKsr8183JFN+SkQlPlEGYRMY9z+s3Ql2DUevat:gAkPlE99SCQl2DUevat
                                                                                                                  MD5:55B6C5EEC98BCAFD3BE82896D4ED77E6
                                                                                                                  SHA1:BDF583ABE8894D7F2C950C8ADEB0F0F0313744EB
                                                                                                                  SHA-256:81FF499ECC55476696C2BBAD719067A0B0F9B81EE1C07E4CD4D85DB46AA708AD
                                                                                                                  SHA-512:D3F05F14EE53C32B8A09C76FDD503ADF7F689D87DC0434BC0F3DD0DC0F365820EFB59F62AA7D7424C4F11A42FDC2DAA35FCBAA73C0BB3B4A5E852CA648CE06F8
                                                                                                                  Malicious:false
                                                                                                                  Preview:p...... ........9...yE..(.................................................l.@... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:JSON data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):521377
                                                                                                                  Entropy (8bit):4.9084889265453135
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:gdTb5Sb3F2FqSrfZm+CnQsbzxZO7aYb6f5780K2:wb5q3umBnzT
                                                                                                                  MD5:C37972CBD8748E2CA6DA205839B16444
                                                                                                                  SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                                                                                                                  SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                                                                                                                  SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                                                                                                                  Malicious:false
                                                                                                                  Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):773040
                                                                                                                  Entropy (8bit):6.55939673749297
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:Zn84XULLDs51UJQSOf9VvLXHyheIQ47gEFGHtAgk3+/cLQ/zhm1kjFKy6Nyjbqq+:N8XPDs5+ivOXgo1kYvyz2
                                                                                                                  MD5:4296A064B917926682E7EED650D4A745
                                                                                                                  SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                                                                                                                  SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                                                                                                                  SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                                                                                                                  Malicious:false
                                                                                                                  Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2278
                                                                                                                  Entropy (8bit):3.8457581398014917
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:uiTrlKxsxxbJxl9Il8u/NNcy+Y0NUxCt6vhuj8Fn+1d1rc:v79YpNN1F0yxmjjUX
                                                                                                                  MD5:BB8DCE9BBACD48D7EF6202A84E41ABFF
                                                                                                                  SHA1:782385F73DD9537AAE783B7D8E963DAB710E5CC4
                                                                                                                  SHA-256:AC30A6B68F55DFD029098BA959C01EA908B7EADC2276E88429B0D7B2FDC9C473
                                                                                                                  SHA-512:4A16C4DE75A0E3A754FA506F9572C1C34BD13A28C7B5792C81FA149F3399633EB4CA378BCAC5BC5553168DAF122C2E118D8DCA93D136FDC14AF4400BAB5CAC5E
                                                                                                                  Malicious:false
                                                                                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.C.r.J.d.I.F.F.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.F.9.4.2.K.i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2684
                                                                                                                  Entropy (8bit):3.906958887195286
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:uiTrlKxJxMrxl9Il8u/NCKQbkk90An10r/KMHrqd/vc:dYpNJakU0AIP7
                                                                                                                  MD5:AEF4BC303EB0166544B95BD547C0BE6E
                                                                                                                  SHA1:6FBF5E3700B4DCF6EDBE82A6347F260D8635233B
                                                                                                                  SHA-256:6ADFFBB8025999F8A118AB878552065A3EA83550EFFD2B6EA5FA50C2B711FF0E
                                                                                                                  SHA-512:EC53AE15BB94CF029B79E52B4759C6565D958938694F20F277F129D772CB3460DF54E48DF346318D60622D4F74821625FC0425BBE49527AF68BE659DD66A1692
                                                                                                                  Malicious:false
                                                                                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".2.t.v.s.i.0.p.k.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.F.9.4.2.K.i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4542
                                                                                                                  Entropy (8bit):4.00465029538022
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:IwYpN4B0E5V0sUdx/l0WdlylVKcWR1zaIeA9ZN5ER9t/A:v6/E59Kxt7Zceha6z7Ep/A
                                                                                                                  MD5:C8ECCA2565A05563BC972930CC46B6DF
                                                                                                                  SHA1:ADDE901393777C34B175DE12D3BCFB46FE53C615
                                                                                                                  SHA-256:DF4CDEC417CBE978A9FBDCC6B8E5A47A4DB6085D462A6C0FE4BCBD78290231A7
                                                                                                                  SHA-512:8A56C911210278D218B7725EA268D1A44D23BA4CF07CA29889F11DB6EA2152040F31E9E55279ABBDA49E7488529A2C0BEFF6847DC28357D20AC343A393AEC3DC
                                                                                                                  Malicious:false
                                                                                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".u.M.x.q.W.n.l.F.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.F.9.4.2.K.i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1428x2020, components 3
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):217242
                                                                                                                  Entropy (8bit):7.641248072397463
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:0yKKhARKP6+FeRJhaigk8Ukyhxv8vyNrwyJN2EiXo4EaCNSltkprZvyYqZtGq:0yKKhEKBSf/vv8vyNjz9oltkyY2
                                                                                                                  MD5:6CFFBB054A1BD06B3B1018684467A551
                                                                                                                  SHA1:347CECCBDFCE4CB2AA96F90735C2F5975E9ABC3F
                                                                                                                  SHA-256:E0967AD8F4F2DF25AD1343AABF1C144E48D83BC3E61E2122F5BBF9A83EA63709
                                                                                                                  SHA-512:24726671FEFA5228737C2E3E2CC159ECA90CD770022051A07C4C059B5378DA251E70568C956CB00631E12424FF5218E7A9A9BE30B0F4D47C277FC470218F88F0
                                                                                                                  Malicious:false
                                                                                                                  Preview:......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..:(......(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1536
                                                                                                                  Entropy (8bit):0.09783851312991518
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:llmn/lLfn:YZn
                                                                                                                  MD5:881EE5BD27A267B0F01FD15E90AC4309
                                                                                                                  SHA1:39D217D0F4BDE69A9A163E9F6C5728FDE81907F7
                                                                                                                  SHA-256:90305EA213DDD5187AC57A744160391E8F9CD88FE8C355170291294739AAE912
                                                                                                                  SHA-512:870D03A7DE2D66778F5199708387802196419BCA134EF50F6279715EC0EEFCB01AAE209ABCB790397A855301409EC6403A3B002214CB5B07153AD4CBD7B556B7
                                                                                                                  Malicious:false
                                                                                                                  Preview:../.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20971520
                                                                                                                  Entropy (8bit):0.015361609667682003
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:8zTqyzm0GzJpqjCtnT0JaiDh3QcPyASgPOB2:e
                                                                                                                  MD5:BFAFC4EC2787FD76304E097B5D33CA6B
                                                                                                                  SHA1:5019C566F1907206AF0FF2EEF2D97314AEBD4DAD
                                                                                                                  SHA-256:5DBDFFFC4F98D261F035508A5B9E8A86CEF7C5DA3C53A9F5C9A70FD014AD0F38
                                                                                                                  SHA-512:3A7636109479976460DCBD099DFB670BDF9DDF988C9B7D68E6303D4BC69B34B5F6208218A212BBCDC2EAAF5930854C0126A7F00D307153C88CEBF13376F93905
                                                                                                                  Malicious:false
                                                                                                                  Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..12/03/2024 11:47:00.921.WINWORD (0x1DE8).0x1EA4.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":22,"Time":"2024-12-03T11:47:00.921Z","Contract":"Office.System.Activity","Activity.CV":"DG1TdP2QD0OJqWI38KvSeA.7.1","Activity.Duration":318,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Activity.Result.Code":-2147024890,"Activity.Result.Type":"HRESULT","Activity.Result.Tag":528307459}...12/03/2024 11:47:00.921.WINWORD (0x1DE8).0x1EA4.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.ProcessIdleQueueJob","Flags":33777014401990913,"InternalSequenceNumber":23,"Time":"2024-12-03T11:47:00.921Z","Contract":"Office.System.Activity","Activity.CV":"DG1TdP2QD0OJqWI38KvSeA.7","Activity.Duration":6747,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Data.FailureD
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20971520
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                                                                                                  SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                                                                                                  SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                                                                                                  SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                                                                                                  Malicious:false
                                                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):274
                                                                                                                  Entropy (8bit):3.438490642908344
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXZlaWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyplagN2RGHmD0wbnKYZAH+Vwv
                                                                                                                  MD5:0F98498818DC28E82597356E2650773C
                                                                                                                  SHA1:1995660972A978D17BC483FCB5EE6D15E7058046
                                                                                                                  SHA-256:4587CA0B2A60728FF0A5B8E87D35BF6C6FDF396747E13436EC856612AC1C6288
                                                                                                                  SHA-512:768562F20CFE15001902CCE23D712C7439721ECA6E48DDDCF8BFF4E7F12A3BC60B99C274CBADD0128EEA1231DB19808BAA878E825497F3860C381914C21B46FF
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.l.e.m.e.n.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):34415
                                                                                                                  Entropy (8bit):7.352974342178997
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                                                                                  MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                                                                                  SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                                                                                  SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                                                                                  SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):332
                                                                                                                  Entropy (8bit):3.547857457374301
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXSpGLMeKlPaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyipTIw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:4EC6724CBBA516CF202A6BD17226D02C
                                                                                                                  SHA1:E412C574D567F0BA68B4A31EDB46A6AB3546EA95
                                                                                                                  SHA-256:18E408155A2C2A24D91CD45E065927FFDA726356AAB115D290A3C1D0B7100402
                                                                                                                  SHA-512:DE45011A084AB94BF5B27F2EC274D310CF68DF9FB082E11726E08EB89D5D691EA086C9E0298E16AE7AE4B23753E5916F69F78AAD82F4627FC6F80A6A43D163DB
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .h.a.r.v.a.r.d.a.n.g.l.i.a.2.0.0.8.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):284415
                                                                                                                  Entropy (8bit):5.00549404077789
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                                                                                  MD5:33A829B4893044E1851725F4DAF20271
                                                                                                                  SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                                                                                  SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                                                                                  SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2924237
                                                                                                                  Entropy (8bit):7.970803022812704
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                                                                                  MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                                                                                  SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                                                                                  SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                                                                                  SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):286
                                                                                                                  Entropy (8bit):3.5434534344080606
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXIc5+RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny4KcymD0wbnKNAH/lMz1
                                                                                                                  MD5:C9812793A4E94320C49C7CA054EE6AA4
                                                                                                                  SHA1:CC1F88C8F3868B3A9DE7E0E5F928DBD015234ABA
                                                                                                                  SHA-256:A535AE7DD5EDA6D31E1B5053E64D0D7600A7805C6C8F8AF1DB65451822848FFC
                                                                                                                  SHA-512:D28AADEDE0473C5889F3B770E8D34B20570282B154CD9301932BF90BF6205CBBB96B51027DEC6788961BAF2776439ADBF9B56542C82D89280C0BEB600DF4B633
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.a.i.n._.E.v.e.n.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3078052
                                                                                                                  Entropy (8bit):7.954129852655753
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                                                                                  MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                                                                                  SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                                                                                  SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                                                                                  SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):274
                                                                                                                  Entropy (8bit):3.5303110391598502
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXzRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnylymD0wbnKNAH/lMz1
                                                                                                                  MD5:8D1E1991838307E4C2197ECB5BA9FA79
                                                                                                                  SHA1:4AD8BB98DC9C5060B58899B3E9DCBA6890BC9E93
                                                                                                                  SHA-256:4ABA3D10F65D050A19A3C2F57A024DBA342D1E05706A8A3F66B6B8E16A980DB9
                                                                                                                  SHA-512:DCDC9DB834303CC3EC8F1C94D950A104C504C588CE7631CE47E24268AABC18B1C23B6BEC3E2675E8A2A11C4D80EBF020324E0C7F985EA3A7BBC77C1101C23D01
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.s.h...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):242
                                                                                                                  Entropy (8bit):3.4938093034530917
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX44lWWoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvToGHmD0+dAH/luWvv
                                                                                                                  MD5:A6B2731ECC78E7CED9ED5408AB4F2931
                                                                                                                  SHA1:BA15D036D522978409846EA682A1D7778381266F
                                                                                                                  SHA-256:6A2F9E46087B1F0ED0E847AF05C4D4CC9F246989794993E8F3E15B633EFDD744
                                                                                                                  SHA-512:666926612E83A7B4F6259C3FFEC3185ED3F07BDC88D43796A24C3C9F980516EB231BDEA4DC4CC05C6D7714BA12AE2DCC764CD07605118698809DEF12A71F1FDD
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4888
                                                                                                                  Entropy (8bit):7.8636569313247335
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                                                                                  MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                                                                                  SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                                                                                  SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                                                                                  SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):252
                                                                                                                  Entropy (8bit):3.4680595384446202
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXivlE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyydGHmD0+dAH/luWvv
                                                                                                                  MD5:D79B5DE6D93AC06005761D88783B3EE6
                                                                                                                  SHA1:E05BDCE2673B6AA8CBB17A138751EDFA2264DB91
                                                                                                                  SHA-256:96125D6804544B8D4E6AE8638EFD4BD1F96A1BFB9EEF57337FFF40BA9FF4CDD1
                                                                                                                  SHA-512:34057F7B2AB273964CB086D8A7DF09A4E05D244A1A27E7589BDC7E5679AB5F587FAB52A2261DB22070DA11EF016F7386635A2B8E54D83730E77A7B142C2E3929
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .a.r.c.h.i.t.e.c.t.u.r.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5783
                                                                                                                  Entropy (8bit):7.88616857639663
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                                                                                  MD5:8109B3C170E6C2C114164B8947F88AA1
                                                                                                                  SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                                                                                  SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                                                                                  SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):314
                                                                                                                  Entropy (8bit):3.5230842510951934
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXJuJaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyZuUw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:F25AC64EC63FA98D9E37782E2E49D6E6
                                                                                                                  SHA1:97DD9CFA4A22F5B87F2B53EFA37332A9EF218204
                                                                                                                  SHA-256:834046A829D1EA836131B470884905856DBF2C3C136C98ADEEFA0F206F38F8AB
                                                                                                                  SHA-512:A0387239CDE98BCDE1668B582B046619C3B3505F9440343DAD22B1B7B9E05F3B74F2AE29E591EC37B6570A0C0E5FE571442873594B0684DDCCB4F6A1B5E10B1F
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.e.e.e.2.0.0.6.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):294178
                                                                                                                  Entropy (8bit):4.977758311135714
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                                                                                  MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                                                                                  SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                                                                                  SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                                                                                  SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3611324
                                                                                                                  Entropy (8bit):7.965784120725206
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                                                                                  MD5:FB88BFB743EEA98506536FC44B053BD0
                                                                                                                  SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                                                                                  SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                                                                                  SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):288
                                                                                                                  Entropy (8bit):3.5359188337181853
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXe46x8RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyO3UymD0wbnKNAH/lMz1
                                                                                                                  MD5:0FEA64606C519B78B7A52639FEA11492
                                                                                                                  SHA1:FC9A6D5185088318032FD212F6BDCBD1CF2FFE76
                                                                                                                  SHA-256:60059C4DD87A74A2DC36748941CF5A421ED394368E0AA19ACA90D850FA6E4A13
                                                                                                                  SHA-512:E04102E435B8297BF33086C0AD291AD36B5B4A97A59767F9CAC181D17CFB21D3CAA3235C7CD59BB301C58169C51C05DDDF2D637214384B9CC0324DAB0BB1EF8D
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.p.o.r._.T.r.a.i.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):332
                                                                                                                  Entropy (8bit):3.4871192480632223
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXsdDUaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyoRw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:333BA58FCE326DEA1E4A9DE67475AA95
                                                                                                                  SHA1:F51FAD5385DC08F7D3E11E1165A18F2E8A028C14
                                                                                                                  SHA-256:66142D15C7325B98B199AB6EE6F35B7409DE64EBD5C0AB50412D18CBE6894097
                                                                                                                  SHA-512:BFEE521A05B72515A8D4F7D13D8810846DC60F1E85C363FFEBD6CACD23AE8D2E664C563FC74700A4ED4E358F378508D25C46CB5BE1CF587E2E278EBC22BB2625
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .m.l.a.s.e.v.e.n.t.h.e.d.i.t.i.o.n.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):254875
                                                                                                                  Entropy (8bit):5.003842588822783
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                                                                                  MD5:377B3E355414466F3E3861BCE1844976
                                                                                                                  SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                                                                                  SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                                                                                  SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):274
                                                                                                                  Entropy (8bit):3.4699940532942914
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXGWWYlIWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxny2WzIgN2RGHmD0wbnKYZAH+Vwv
                                                                                                                  MD5:55BA5B2974A072B131249FD9FD42EB91
                                                                                                                  SHA1:6509F8AC0AA23F9B8F3986217190F10206A691EA
                                                                                                                  SHA-256:13FFAAFFC987BAAEF7833CD6A8994E504873290395DC2BD9B8E1D7E7E64199E7
                                                                                                                  SHA-512:3DFB0B21D09B63AF69698252D073D51144B4E6D56C87B092F5D97CE07CBCF9C966828259C8D95944A7732549C554AE1FF363CB936CA50C889C364AA97501B558
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.s.i.g.h.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3465076
                                                                                                                  Entropy (8bit):7.898517227646252
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                                                                                  MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                                                                                  SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                                                                                  SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                                                                                  SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):777647
                                                                                                                  Entropy (8bit):7.689662652914981
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                                                                                  MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                                                                                  SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                                                                                  SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                                                                                  SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):290
                                                                                                                  Entropy (8bit):3.5091498509646044
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUX1MiDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyFdMymD0wbnKNAH/lMz1
                                                                                                                  MD5:23D59577F4AE6C6D1527A1B8CDB9AB19
                                                                                                                  SHA1:A345D683E54D04CC0105C4BFFCEF8C6617A0093D
                                                                                                                  SHA-256:9ADD2C3912E01C2AC7FAD6737901E4EECBCCE6EC60F8E4D78585469A440E1E2C
                                                                                                                  SHA-512:B85027276B888548ECB8A2FC1DB1574C26FF3FCA7AF1F29CD5074EC3642F9EC62650E7D47462837607E11DCAE879B1F83DF4762CA94667AE70CBF78F8D455346
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.t.r.o.p.o.l.i.t.a.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):486596
                                                                                                                  Entropy (8bit):7.668294441507828
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                                                                                  MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                                                                                  SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                                                                                  SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                                                                                  SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):274
                                                                                                                  Entropy (8bit):3.535303979138867
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUX3IlVARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnynG6ymD0wbnKNAH/lMz1
                                                                                                                  MD5:35AFE8D8724F3E19EB08274906926A0B
                                                                                                                  SHA1:435B528AAF746428A01F375226C5A6A04099DF75
                                                                                                                  SHA-256:97B8B2E246E4DAB15E494D2FB5F8BE3E6361A76C8B406C77902CE4DFF7AC1A35
                                                                                                                  SHA-512:ACF4F124207974CFC46A6F4EA028A38D11B5AF40E55809E5B0F6F5DABA7F6FC994D286026FAC19A0B4E2311D5E9B16B8154F8566ED786E5EF7CDBA8128FD62AF
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.i.e.w...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):286
                                                                                                                  Entropy (8bit):3.4670546921349774
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX0XPYDxUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPYDCloGHmD0+dAH/luWvv
                                                                                                                  MD5:3D52060B74D7D448DC733FFE5B92CB52
                                                                                                                  SHA1:3FBA3FFC315DB5B70BF6F05C4FF84B52A50FCCBC
                                                                                                                  SHA-256:BB980559C6FC38B703D1E9C41720D5CE8D00D2FF86D4F25136DB02B1E54B1518
                                                                                                                  SHA-512:952EF139A72562A528C1052F1942DAE1C0509D67654BF5E7C0602C87F90147E8EE9E251D2632BCB5B511AB2FF8A3734293D0A4E3DBD3D187F5E3C042685F9A0C
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.l.t.e.r.n.a.t.i.n.g.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5630
                                                                                                                  Entropy (8bit):7.87271654296772
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                                                                                  MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                                                                                  SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                                                                                  SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                                                                                  SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):558035
                                                                                                                  Entropy (8bit):7.696653383430889
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                                                                                  MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                                                                                  SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                                                                                  SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                                                                                  SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):276
                                                                                                                  Entropy (8bit):3.5361139545278144
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXeMWMluRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnycMlMymD0wbnKNAH/lMz1
                                                                                                                  MD5:133D126F0DE2CC4B29ECE38194983265
                                                                                                                  SHA1:D8D701298D7949BE6235493925026ED405290D43
                                                                                                                  SHA-256:08485EBF168364D846C6FD55CD9089FE2090D1EE9D1A27C1812E1247B9005E68
                                                                                                                  SHA-512:75D7322BE8A5EF05CAA48B754036A7A6C56399F17B1401F3F501DA5F32B60C1519F2981043A773A31458C3D9E1EF230EC60C9A60CAC6D52FFE16147E2E0A9830
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.s.i.s...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):570901
                                                                                                                  Entropy (8bit):7.674434888248144
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                                                                                  MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                                                                                  SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                                                                                  SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                                                                                  SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):282
                                                                                                                  Entropy (8bit):3.5459495297497368
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXvBAuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnypJymD0wbnKNAH/lMz1
                                                                                                                  MD5:76340C3F8A0BFCEDAB48B08C57D9B559
                                                                                                                  SHA1:E1A6672681AA6F6D525B1D17A15BF4F912C4A69B
                                                                                                                  SHA-256:78FE546321EDB34EBFA1C06F2B6ADE375F3B7C12552AB2A04892A26E121B3ECC
                                                                                                                  SHA-512:49099F040C099A0AED88E7F19338140A65472A0F95ED99DEB5FA87587E792A2D11081D59FD6A83B7EE68C164329806511E4F1B8D673BEC9074B4FF1C09E3435D
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.i.v.i.d.e.n.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):523048
                                                                                                                  Entropy (8bit):7.715248170753013
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                                                                                  MD5:C276F590BB846309A5E30ADC35C502AD
                                                                                                                  SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                                                                                  SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                                                                                  SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):276
                                                                                                                  Entropy (8bit):3.5159096381406645
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXQIa3ARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygIaqymD0wbnKNAH/lMz1
                                                                                                                  MD5:71CCB69AF8DD9821F463270FB8CBB285
                                                                                                                  SHA1:8FED3EB733A74B2A57D72961F0E4CF8BCA42C851
                                                                                                                  SHA-256:8E63D7ABA97DABF9C20D2FAC6EB1665A5D3FDEAB5FA29E4750566424AE6E40B4
                                                                                                                  SHA-512:E62FC5BEAEC98C5FDD010FABDAA8D69237D31CA9A1C73F168B1C3ED90B6A9B95E613DEAD50EB8A5B71A7422942F13D6B5A299EB2353542811F2EF9DA7C3A15DC
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .F.r.a.m.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):608122
                                                                                                                  Entropy (8bit):7.729143855239127
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                                                                                  MD5:8BA551EEC497947FC39D1D48EC868B54
                                                                                                                  SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                                                                                  SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                                                                                  SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):278
                                                                                                                  Entropy (8bit):3.516359852766808
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXKwRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6qymD0wbnKNAH/lMz1
                                                                                                                  MD5:960E28B1E0AB3522A8A8558C02694ECF
                                                                                                                  SHA1:8387E9FD5179A8C811CCB5878BAC305E6A166F93
                                                                                                                  SHA-256:2707FCA8CEC54DF696F19F7BCAD5F0D824A2AC01B73815DE58F3FCF0AAB3F6A0
                                                                                                                  SHA-512:89EA06BA7D18B0B1EA624BBC052F73366522C231BD3B51745B92CF056B445F9D655F9715CBDCD3B2D02596DB4CD189D91E2FE581F2A2AA2F6D814CD3B004950A
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.c.e.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):562113
                                                                                                                  Entropy (8bit):7.67409707491542
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                                                                                  MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                                                                                  SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                                                                                  SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                                                                                  SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):278
                                                                                                                  Entropy (8bit):3.535736910133401
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXeAlFkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyRGymD0wbnKNAH/lMz1
                                                                                                                  MD5:487E25E610F3FC2EEA27AB54324EA8F6
                                                                                                                  SHA1:11C2BB004C5E44503704E9FFEEFA7EA7C2A9305C
                                                                                                                  SHA-256:022EC5077279A8E447B590F7260E1DBFF764DE5F9CDFD4FDEE32C94C66D4A1A2
                                                                                                                  SHA-512:B8DF351E2C0EF101CF91DC02E136A3EE9C1FDB18294BECB13A29D676FBBE791A80A58A18FBDEB953BC21EC54EB7608154D401407C461ABD10ACB94CE8AD0E092
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.n.d.e.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):280
                                                                                                                  Entropy (8bit):3.484503080761839
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXGdQ1MecJZMlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny2dQ98MlWlzGHmD0+dAH/luWvv
                                                                                                                  MD5:1309D172F10DD53911779C89A06BBF65
                                                                                                                  SHA1:274351A1059868E9DEB53ADF01209E6BFBDFADFB
                                                                                                                  SHA-256:C190F9E7D00E053596C3477455D1639C337C0BE01012C0D4F12DFCB432F5EC56
                                                                                                                  SHA-512:31B38AD2D1FFF93E03BF707811F3A18AD08192F906E36178457306DDAB0C3D8D044C69DE575ECE6A4EE584800F827FB3C769F98EA650F1C208FEE84177070339
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.t.e.r.c.o.n.n.e.c.t.e.d.B.l.o.c.k.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):9191
                                                                                                                  Entropy (8bit):7.93263830735235
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                                                                                  MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                                                                                  SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                                                                                  SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                                                                                  SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):260
                                                                                                                  Entropy (8bit):3.494357416502254
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX0XPE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPGHmD0+dAH/luWvv
                                                                                                                  MD5:6F8FE7B05855C203F6DEC5C31885DD08
                                                                                                                  SHA1:9CC27D17B654C6205284DECA3278DA0DD0153AFF
                                                                                                                  SHA-256:B7F58DF058C938CCF39054B31472DC76E18A3764B78B414088A261E440870175
                                                                                                                  SHA-512:C518A243E51CB4A1E3C227F6A8A8D9532EE111D5A1C86EBBB23BD4328D92CD6A0587DF65B3B40A0BE2576D8755686D2A3A55E10444D5BB09FC4E0194DB70AFE6
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.G.r.i.d...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6193
                                                                                                                  Entropy (8bit):7.855499268199703
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                                                                                  MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                                                                                  SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                                                                                  SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                                                                                  SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1649585
                                                                                                                  Entropy (8bit):7.875240099125746
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                                                                                  MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                                                                                  SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                                                                                  SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                                                                                  SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):284
                                                                                                                  Entropy (8bit):3.5552837910707304
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXtLARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygymD0wbnKNAH/lMz1
                                                                                                                  MD5:5728F26DF04D174DE9BDFF51D0668E2A
                                                                                                                  SHA1:C998DF970655E4AF9C270CC85901A563CFDBCC22
                                                                                                                  SHA-256:979DAFD61C23C185830AA3D771EDDC897BEE87587251B84F61776E720ACF9840
                                                                                                                  SHA-512:491B36AC6D4749F7448B9A3A6E6465E8D97FB30F33EF5019AF65660E98F4570711EFF5FC31CBB8414AD9355029610E6F93509BC4B2FB6EA79C7CB09069DE7362
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .W.o.o.d._.T.y.p.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):924687
                                                                                                                  Entropy (8bit):7.824849396154325
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                                                                                  MD5:97EEC245165F2296139EF8D4D43BBB66
                                                                                                                  SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                                                                                  SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                                                                                  SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):282
                                                                                                                  Entropy (8bit):3.51145753448333
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXKsWkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6svymD0wbnKNAH/lMz1
                                                                                                                  MD5:7956D2B60E2A254A07D46BCA07D0EFF0
                                                                                                                  SHA1:AF1AC8CA6FE2F521B2EE2B7ABAB612956A65B0B5
                                                                                                                  SHA-256:C92B7FD46B4553FF2A656FF5102616479F3B503341ED7A349ECCA2E12455969E
                                                                                                                  SHA-512:668F5D0EFA2F5168172E746A6C32820E3758793CFA5DB6791DE39CB706EF7123BE641A8134134E579D3E4C77A95A0F9983F90E44C0A1CF6CDE2C4E4C7AF1ECA0
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.a.l.l.a.x...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):290
                                                                                                                  Entropy (8bit):3.5081874837369886
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXCOzi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnydONGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:8D9B02CC69FA40564E6C781A9CC9E626
                                                                                                                  SHA1:352469A1ABB8DA1DC550D7E27924E552B0D39204
                                                                                                                  SHA-256:1D4483830710EF4A2CC173C3514A9F4B0ACA6C44DB22729B7BE074D18C625BAE
                                                                                                                  SHA-512:8B7DB2AB339DD8085104855F847C48970C2DD32ADB0B8EEA134A64C5CC7DE772615F85D057F4357703B65166C8CF0C06F4F6FD3E60FFC80DA3DD34B16D5B1281
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.n.a.m.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):255948
                                                                                                                  Entropy (8bit):5.103631650117028
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                                                                                  MD5:9888A214D362470A6189DEFF775BE139
                                                                                                                  SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                                                                                  SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                                                                                  SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):966946
                                                                                                                  Entropy (8bit):7.8785200658952
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                                                                                  MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                                                                                  SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                                                                                  SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                                                                                  SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):282
                                                                                                                  Entropy (8bit):3.5323495192404475
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXhduDARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyxdumymD0wbnKNAH/lMz1
                                                                                                                  MD5:BD6B5A98CA4E6C5DBA57C5AD167EDD00
                                                                                                                  SHA1:CCFF7F635B31D12707DC0AC6D1191AB5C4760107
                                                                                                                  SHA-256:F22248FE60A55B6C7C1EB31908FAB7726813090DE887316791605714E6E3CEF7
                                                                                                                  SHA-512:A178299461015970AF23BA3D10E43FCA5A6FB23262B0DD0C5DDE01D338B4959F222FD2DC2CC5E3815A69FDDCC3B6B4CB8EE6EC0883CE46093C6A59FF2B042BC1
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .Q.u.o.t.a.b.l.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):976001
                                                                                                                  Entropy (8bit):7.791956689344336
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                                                                                  MD5:9E563D44C28B9632A7CF4BD046161994
                                                                                                                  SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                                                                                  SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                                                                                  SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):278
                                                                                                                  Entropy (8bit):3.5270134268591966
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXa3Y1kRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyt1mymD0wbnKNAH/lMz1
                                                                                                                  MD5:327DA4A5C757C0F1449976BE82653129
                                                                                                                  SHA1:CF74ECDF94B4A8FD4C227313C8606FD53B8EEA71
                                                                                                                  SHA-256:341BABD413AA5E8F0A921AC309A8C760A4E9BA9CFF3CAD3FB2DD9DF70FD257A6
                                                                                                                  SHA-512:9184C3FB989BB271B4B3CDBFEFC47EA8ABEB12B8904EE89797CC9823F33952BD620C061885A5C11BBC1BD3978C4B32EE806418F3F21DA74F1D2DB9817F6E167E
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.e.r.l.i.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1204049
                                                                                                                  Entropy (8bit):7.92476783994848
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                                                                                  MD5:FD5BBC58056522847B3B75750603DF0C
                                                                                                                  SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                                                                                  SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                                                                                  SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):276
                                                                                                                  Entropy (8bit):3.5364757859412563
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXARkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnywMymD0wbnKNAH/lMz1
                                                                                                                  MD5:CD465E8DA15E26569897213CA9F6BC9C
                                                                                                                  SHA1:9EA9B5E6C9B7BF72A777A21EC17FD82BC4386D4C
                                                                                                                  SHA-256:D4109317C2DBA1D7A94FC1A4B23FA51F4D0FC8E1D9433697AAFA72E335192610
                                                                                                                  SHA-512:869A42679F96414FE01FE1D79AF7B33A0C9B598B393E57E0E4D94D68A4F2107EC58B63A532702DA96A1F2F20CE72E6E08125B38745CD960DF62FE539646EDD8D
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.a.v.o.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1091485
                                                                                                                  Entropy (8bit):7.906659368807194
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                                                                                  MD5:2192871A20313BEC581B277E405C6322
                                                                                                                  SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                                                                                  SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                                                                                  SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):280
                                                                                                                  Entropy (8bit):3.5301133500353727
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXp2pRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyZ2vymD0wbnKNAH/lMz1
                                                                                                                  MD5:1C5D58A5ED3B40486BC22B254D17D1DD
                                                                                                                  SHA1:69B8BB7B0112B37B9B5F9ADA83D11FBC99FEC80A
                                                                                                                  SHA-256:EBE031C340F04BB0235FE62C5A675CF65C5CC8CE908F4621A4F5D7EE85F83055
                                                                                                                  SHA-512:4736E4F26C6FAAB47718945BA54BD841FE8EF61F0DBA927E5C4488593757DBF09689ABC387A8A44F7C74AA69BA89BEE8EA55C87999898FEFEB232B1BA8CC7086
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .G.a.l.l.e.r.y...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1463634
                                                                                                                  Entropy (8bit):7.898382456989258
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                                                                                  MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                                                                                  SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                                                                                  SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                                                                                  SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):280
                                                                                                                  Entropy (8bit):3.5286004619027067
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXOzXkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6WymD0wbnKNAH/lMz1
                                                                                                                  MD5:40FF521ED2BA1B015F17F0B0E5D95068
                                                                                                                  SHA1:0F29C084311084B8FDFE67855884D8EB60BDE1A6
                                                                                                                  SHA-256:CC3575BA195F0F271FFEBA6F6634BC9A2CF5F3BE448F58DBC002907D7C81CBBB
                                                                                                                  SHA-512:9507E6145417AC730C284E58DC6B2063719400B395615C40D7885F78F57D55B251CB9C954D573CB8B6F073E4CEA82C0525AE90DEC68251C76A6F1B03FD9943C0
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.u.i.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1750795
                                                                                                                  Entropy (8bit):7.892395931401988
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                                                                                  MD5:529795E0B55926752462CBF32C14E738
                                                                                                                  SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                                                                                  SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                                                                                  SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):280
                                                                                                                  Entropy (8bit):3.528155916440219
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXcmlDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyMmloymD0wbnKNAH/lMz1
                                                                                                                  MD5:AA7B919B21FD42C457948DE1E2988CB3
                                                                                                                  SHA1:19DA49CF5540E5840E95F4E722B54D44F3154E04
                                                                                                                  SHA-256:5FFF5F1EC1686C138192317D5A67E22A6B02E5AAE89D73D4B19A492C2F5BE2F9
                                                                                                                  SHA-512:01D27377942F69A0F2FE240DD73A1F97BB915E19D3D716EE4296C6EF8D8933C80E4E0C02F6C9FA72E531246713364190A2F67F43EDBE12826A1529BC2A629B00
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.r.o.p.l.e.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):374
                                                                                                                  Entropy (8bit):3.5414485333689694
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX8FaE3f8AWqlQqr++lcWimqnKOE3QepmlJ0+3FbnKfZObdADryMluxHZypo:fxnyj9AWI+acgq9GHmD0wbnKYZAH/lMf
                                                                                                                  MD5:2F7A8FE4E5046175500AFFA228F99576
                                                                                                                  SHA1:8A3DE74981D7917E6CE1198A3C8E35C7E2100F43
                                                                                                                  SHA-256:1495B4EC56B371148EA195D790562E5621FDBF163CDD8A5F3C119F8CA3BD2363
                                                                                                                  SHA-512:4B8FBB692D91D88B584E46C2F01BDE0C05DCD5D2FF073D83331586FB3D201EACD777D48DB3751E534E22115AA1C3C30392D0D642B3122F21EF10E3EE6EA3BE82
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.e.x.t. .S.i.d.e.b.a.r. .(.A.n.n.u.a.l. .R.e.p.o.r.t. .R.e.d. .a.n.d. .B.l.a.c.k. .d.e.s.i.g.n.)...d.o.c.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):47296
                                                                                                                  Entropy (8bit):6.42327948041841
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                                                                                  MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                                                                                  SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                                                                                  SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                                                                                  SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):246
                                                                                                                  Entropy (8bit):3.5039994158393686
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX4f+E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvGHmD0+dAH/luWvv
                                                                                                                  MD5:16711B951E1130126E240A6E4CC2E382
                                                                                                                  SHA1:8095AA79AEE029FD06428244CA2A6F28408448DB
                                                                                                                  SHA-256:855342FE16234F72DA0C2765455B69CF412948CFBE70DE5F6D75A20ACDE29AE9
                                                                                                                  SHA-512:454EAA0FD669489583C317699BE1CE5D706C31058B08CF2731A7621FDEFB6609C2F648E02A7A4B2B3A3DFA8406A696D1A6FA5063DDA684BDA4450A2E9FEFB0EF
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.b.e.d.A.r.c...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3683
                                                                                                                  Entropy (8bit):7.772039166640107
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                                                                                  MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                                                                                  SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                                                                                  SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                                                                                  SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):254
                                                                                                                  Entropy (8bit):3.4845992218379616
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXQFoElh/lE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8lLGHmD0+dAH/luWvv
                                                                                                                  MD5:E8B30D1070779CC14FBE93C8F5CF65BE
                                                                                                                  SHA1:9C87F7BC66CF55634AB3F070064AAF8CC977CD05
                                                                                                                  SHA-256:2E90434BE1F6DCEA9257D42C331CD9A8D06B848859FD4742A15612B2CA6EFACB
                                                                                                                  SHA-512:C0D5363B43D45751192EF06C4EC3C896A161BB11DBFF1FC2E598D28C644824413C78AE3A68027F7E622AF0D709BE0FA893A3A3B4909084DF1ED9A8C1B8267FCA
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .H.e.x.a.g.o.n.R.a.d.i.a.l...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6024
                                                                                                                  Entropy (8bit):7.886254023824049
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                                                                                  MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                                                                                  SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                                                                                  SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                                                                                  SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):262
                                                                                                                  Entropy (8bit):3.4901887319218092
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXqhBMl0OoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyiMl0OoGHmD0+dAH/luWvv
                                                                                                                  MD5:52BD0762F3DC77334807DDFC60D5F304
                                                                                                                  SHA1:5962DA7C58F742046A116DDDA5DC8EA889C4CB0E
                                                                                                                  SHA-256:30C20CC835E912A6DD89FD1BF5F7D92B233B2EC24594F1C1FE0CADB03A8C3FAB
                                                                                                                  SHA-512:FB68B1CF9677A00D5651C51EC604B61DAC2D250D44A71D43CD69F41F16E4F0A7BAA7AD4A6F7BB870429297465A893013BBD7CC77A8F709AD6DB97F5A0927B1DD
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .R.a.d.i.a.l.P.i.c.t.u.r.e.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5596
                                                                                                                  Entropy (8bit):7.875182123405584
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                                                                                  MD5:CDC1493350011DB9892100E94D5592FE
                                                                                                                  SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                                                                                  SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                                                                                  SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2218943
                                                                                                                  Entropy (8bit):7.942378408801199
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                                                                                  MD5:EE33FDA08FBF10EF6450B875717F8887
                                                                                                                  SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                                                                                  SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                                                                                  SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):278
                                                                                                                  Entropy (8bit):3.544065206514744
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUXCARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyy6ymD0wbnKNAH/lMz1
                                                                                                                  MD5:06B3DDEFF905F75FA5FA5C5B70DCB938
                                                                                                                  SHA1:E441B94F0621D593DC870A27B28AC6BE3842E7DB
                                                                                                                  SHA-256:72D49BDDE44DAE251AEADF963C336F72FA870C969766A2BB343951E756B3C28A
                                                                                                                  SHA-512:058792BAA633516037E7D833C8F59584BA5742E050FA918B1BEFC6F64A226AB3821B6347A729BEC2DF68BB2DFD2F8E27947F74CD4F6BDF842606B9DEDA0B75CC
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.a.m.a.s.k...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):260
                                                                                                                  Entropy (8bit):3.4895685222798054
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX4cPBl4xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyPl4xoGHmD0+dAH/luWvv
                                                                                                                  MD5:63E8B0621B5DEFE1EF17F02EFBFC2436
                                                                                                                  SHA1:2D02AD4FD9BF89F453683B7D2B3557BC1EEEE953
                                                                                                                  SHA-256:9243D99795DCDAD26FA857CB2740E58E3ED581E3FAEF0CB3781CBCD25FB4EE06
                                                                                                                  SHA-512:A27CDA84DF5AD906C9A60152F166E7BD517266CAA447195E6435997280104CBF83037F7B05AE9D4617323895DCA471117D8C150E32A3855156CB156E15FA5864
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.r.y.i.n.g.W.i.d.t.h.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3075
                                                                                                                  Entropy (8bit):7.716021191059687
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                                                                                  MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                                                                                  SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                                                                                  SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                                                                                  SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):256
                                                                                                                  Entropy (8bit):3.4842773155694724
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXDAlIJAFIloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyMlI7loGHmD0+dAH/luWvv
                                                                                                                  MD5:923D406B2170497AD4832F0AD3403168
                                                                                                                  SHA1:A77DA08C9CB909206CDE42FE1543B9FE96DF24FB
                                                                                                                  SHA-256:EBF9CF474B25DDFE0F6032BA910D5250CBA2F5EDF9CF7E4B3107EDB5C13B50BF
                                                                                                                  SHA-512:A4CD8C74A3F916CA6B15862FCA83F17F2B1324973CCBCC8B6D9A8AEE63B83A3CD880DC6821EEADFD882D74C7EF58FA586781DED44E00E8B2ABDD367B47CE45B7
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.o.n.v.e.r.g.i.n.g.T.e.x.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):11380
                                                                                                                  Entropy (8bit):7.891971054886943
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                                                                                  MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                                                                                  SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                                                                                  SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                                                                                  SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2357051
                                                                                                                  Entropy (8bit):7.929430745829162
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                                                                                  MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                                                                                  SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                                                                                  SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                                                                                  SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):276
                                                                                                                  Entropy (8bit):3.516423078177173
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:Q+sxnxUX7kARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny5ymD0wbnKNAH/lMz1
                                                                                                                  MD5:5402138088A9CF0993C08A0CA81287B8
                                                                                                                  SHA1:D734BD7F2FB2E0C7D5DB8F70B897376ECA935C9A
                                                                                                                  SHA-256:5C9F5E03EEA4415043E65172AD2729F34BBBFC1A1156A630C65A71CE578EF137
                                                                                                                  SHA-512:F40A8704F16AB1D5DCD861355B07C7CB555934BB9DA85AACDCF869DC942A9314FFA12231F9149D28D438BE6A1A14FCAB332E54B6679E29AD001B546A0F48DE64
                                                                                                                  Malicious:false
                                                                                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.l.a.t.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):258
                                                                                                                  Entropy (8bit):3.4692172273306268
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXcq9DsoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnysmYoGHmD0+dAH/luWvv
                                                                                                                  MD5:C1B36A0547FB75445957A619201143AC
                                                                                                                  SHA1:CDB0A18152F57653F1A707D39F3D7FB504E244A7
                                                                                                                  SHA-256:4DFF7D1CEF6DD85CC73E1554D705FA6586A1FBD10E4A73EEE44EAABA2D2FFED9
                                                                                                                  SHA-512:0923FB41A6DB96C85B44186E861D34C26595E37F30A6F8E554BD3053B99F237D9AC893D47E8B1E9CF36556E86EFF5BE33C015CBBDD31269CDAA68D6947C47F3F
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .p.i.c.t.u.r.e.o.r.g.c.h.a.r.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):7370
                                                                                                                  Entropy (8bit):7.9204386289679745
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                                                                                  MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                                                                                  SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                                                                                  SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                                                                                  SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):302
                                                                                                                  Entropy (8bit):3.537169234443227
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXfQIUA/e/Wl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXZ/eulNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:9C00979164E78E3B890E56BE2DF00666
                                                                                                                  SHA1:1FA3C439D214C34168ADF0FBA5184477084A0E51
                                                                                                                  SHA-256:21CCB63A82F1E6ACD6BAB6875ABBB37001721675455C746B17529EE793382C7B
                                                                                                                  SHA-512:54AC8732C2744B60DA744E54D74A2664658E4257A136ABE886FF21585E8322E028D8243579D131EF4E9A0ABDDA70B4540A051C8B8B60D65C3EC0888FD691B9A7
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0.n.m.e.r.i.c.a.l...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):217137
                                                                                                                  Entropy (8bit):5.068335381017074
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                                                                                  MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                                                                                  SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                                                                                  SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                                                                                  SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):290
                                                                                                                  Entropy (8bit):3.5161159456784024
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX+l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyulNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:C15EB3F4306EBF75D1E7C3C9382DEECC
                                                                                                                  SHA1:A3F9684794FFD59151A80F97770D4A79F1D030A6
                                                                                                                  SHA-256:23C262DF3AEACB125E88C8FFB7DBF56FD23F66E0D476AFD842A68DDE69658C7F
                                                                                                                  SHA-512:ACDF7D69A815C42223FD6300179A991A379F7166EFAABEE41A3995FB2030CD41D8BCD46B566B56D1DFBAE8557AFA1D9FD55143900A506FA733DE9DA5D73389D6
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .t.u.r.a.b.i.a.n...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):344303
                                                                                                                  Entropy (8bit):5.023195898304535
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                                                                                  MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                                                                                  SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                                                                                  SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                                                                                  SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):264
                                                                                                                  Entropy (8bit):3.4866056878458096
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX0XrZUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXWloGHmD0+dAH/luWvv
                                                                                                                  MD5:6C489D45F3B56845E68BE07EA804C698
                                                                                                                  SHA1:C4C9012C0159770CB882870D4C92C307126CEC3F
                                                                                                                  SHA-256:3FE447260CDCDEE287B8D01CF5F9F53738BFD6AAEC9FB9787F2826F8DEF1CA45
                                                                                                                  SHA-512:D1355C48A09E7317773E4F1613C4613B7EA42D21F5A6692031D288D69D47B19E8F4D5A29AFD8B751B353FC7DE865EAE7CFE3F0BEC05F33DDF79526D64A29EB18
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6448
                                                                                                                  Entropy (8bit):7.897260397307811
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                                                                                  MD5:42A840DC06727E42D42C352703EC72AA
                                                                                                                  SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                                                                                  SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                                                                                  SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):278
                                                                                                                  Entropy (8bit):3.5280239200222887
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXQAl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyllNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:877A8A960B2140E3A0A2752550959DB9
                                                                                                                  SHA1:FBEC17B332CBC42F2F16A1A08767623C7955DF48
                                                                                                                  SHA-256:FE07084A41CF7DB58B06D2C0D11BCACB603D6574261D1E7EBADCFF85F39AFB47
                                                                                                                  SHA-512:B8B660374EC6504B3B5FCC7DAC63AF30A0C9D24306C36B33B33B23186EC96AEFE958A3851FF3BC57FBA72A1334F633A19C0B8D253BB79AA5E5AFE4A247105889
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.b...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):268317
                                                                                                                  Entropy (8bit):5.05419861997223
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                                                                                  MD5:51D32EE5BC7AB811041F799652D26E04
                                                                                                                  SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                                                                                  SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                                                                                  SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):256
                                                                                                                  Entropy (8bit):3.464918006641019
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXR+EqRGRnRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyB+5RmRGHmD0wbnKYZAH+Vwv
                                                                                                                  MD5:93149E194021B37162FD86684ED22401
                                                                                                                  SHA1:1B31CAEBE1BBFA529092BE834D3B4AD315A6F8F1
                                                                                                                  SHA-256:50BE99A154A6F632D49B04FCEE6BCA4D6B3B4B7C1377A31CE9FB45C462D697B2
                                                                                                                  SHA-512:410A7295D470EC85015720B2B4AC592A472ED70A04103D200FA6874BEA6A423AF24766E98E5ACAA3A1DBC32C44E8790E25D4611CD6C0DBFFFE8219D53F33ACA7
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.q.u.a.t.i.o.n.s...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):51826
                                                                                                                  Entropy (8bit):5.541375256745271
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                                                                                  MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                                                                                  SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                                                                                  SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                                                                                  SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):333258
                                                                                                                  Entropy (8bit):4.654450340871081
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                                                                                  MD5:5632C4A81D2193986ACD29EADF1A2177
                                                                                                                  SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                                                                                  SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                                                                                  SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):328
                                                                                                                  Entropy (8bit):3.541819892045459
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXuqRDA5McaQVTi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxny+AASZQoNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:C3216C3FC73A4B3FFFE7ED67153AB7B5
                                                                                                                  SHA1:F20E4D33BABE978BE6A6925964C57D6E6EF1A92E
                                                                                                                  SHA-256:7CF1D6A4F0BE5E6184F59BFB1304509F38E480B59A3B091DBDC43B052D2137CB
                                                                                                                  SHA-512:D3B78BE6E7633FF943F5E34063B5EFA4AF239CD49F437227FC7575F6CC65C497B7D6F6A979EA065065BEAF257CB368560B5462542692286052B5C7E5C01755BC
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .A.P.A.S.i.x.t.h.E.d.i.t.i.o.n.O.f.f.i.c.e.O.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):292
                                                                                                                  Entropy (8bit):3.5026803317779778
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXC89ADni8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyf9ADiNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:A0D51783BFEE86F3AC46A810404B6796
                                                                                                                  SHA1:93C5B21938DA69363DBF79CE594C302344AF9D9E
                                                                                                                  SHA-256:47B43E7DBDF8B25565D874E4E071547666B08D7DF4D736EA8521591D0DED640F
                                                                                                                  SHA-512:CA3DB5A574745107E1D6CAA60E491F11D8B140637D4ED31577CC0540C12FDF132D8BC5EBABEA3222F4D7BA1CA016FF3D45FE7688D355478C27A4877E6C4D0D75
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.t.i.t.l.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):251032
                                                                                                                  Entropy (8bit):5.102652100491927
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                                                                                  MD5:F425D8C274A8571B625EE66A8CE60287
                                                                                                                  SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                                                                                  SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                                                                                  SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):238
                                                                                                                  Entropy (8bit):3.472155835869843
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXGE2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny4GHmD0+dAH/luWvv
                                                                                                                  MD5:2240CF2315F2EB448CEA6E9CE21B5AC5
                                                                                                                  SHA1:46332668E2169E86760CBD975FF6FA9DB5274F43
                                                                                                                  SHA-256:0F7D0BD5A8CED523CFF4F99D7854C0EE007F5793FA9E1BA1CD933B0894BFBD0D
                                                                                                                  SHA-512:10BA73FF861112590BF135F4B337346F9D4ACEB10798E15DC5976671E345BC29AC8527C6052FEC86AA7058E06D1E49052E49D7BCF24A01DB259B5902DB091182
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .r.i.n.g.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5151
                                                                                                                  Entropy (8bit):7.859615916913808
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                                                                                  MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                                                                                  SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                                                                                  SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                                                                                  SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):252
                                                                                                                  Entropy (8bit):3.48087342759872
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXXt1MIae2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyfMIaRGHmD0+dAH/luWvv
                                                                                                                  MD5:69757AF3677EA8D80A2FBE44DEE7B9E4
                                                                                                                  SHA1:26AF5881B48F0CB81F194D1D96E3658F8763467C
                                                                                                                  SHA-256:0F14CA656CDD95CAB385F9B722580DDE2F46F8622E17A63F4534072D86DF97C3
                                                                                                                  SHA-512:BDA862300BAFC407D662872F0BFB5A7F2F72FE1B7341C1439A22A70098FA50C81D450144E757087778396496777410ADCE4B11B655455BEDC3D128B80CFB472A
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.i.c.t.u.r.e.F.r.a.m.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4326
                                                                                                                  Entropy (8bit):7.821066198539098
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                                                                                  MD5:D32E93F7782B21785424AE2BEA62B387
                                                                                                                  SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                                                                                  SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                                                                                  SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):254
                                                                                                                  Entropy (8bit):3.4721586910685547
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUX9+RclTloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyteUTloGHmD0+dAH/luWvv
                                                                                                                  MD5:4DD225E2A305B50AF39084CE568B8110
                                                                                                                  SHA1:C85173D49FC1522121AA2B0B2E98ADF4BB95B897
                                                                                                                  SHA-256:6F00DD73F169C73D425CB9895DAC12387E21C6E4C9C7DDCFB03AC32552E577F4
                                                                                                                  SHA-512:0493AB431004191381FF84AD7CC46BD09A1E0FEEC16B3183089AA8C20CC7E491FAE86FE0668A9AC677F435A203E494F5E6E9E4A0571962F6021D6156B288B28A
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.e.v.r.o.n.a.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4243
                                                                                                                  Entropy (8bit):7.824383764848892
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                                                                                  MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                                                                                  SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                                                                                  SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                                                                                  SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4026
                                                                                                                  Entropy (8bit):7.809492693601857
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                                                                                  MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                                                                                  SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                                                                                  SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                                                                                  SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):250
                                                                                                                  Entropy (8bit):3.4916022431157345
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXsAl8xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8A8xoGHmD0+dAH/luWvv
                                                                                                                  MD5:1A314B08BB9194A41E3794EF54017811
                                                                                                                  SHA1:D1E70DB69CA737101524C75E634BB72F969464FF
                                                                                                                  SHA-256:9025DD691FCAD181D5FD5952C7AA3728CD8A2CAF20DEA14930876419BED9B379
                                                                                                                  SHA-512:AB29C8674A85711EABAE5F9559E9048FE91A2F51EB12D5A46152A310DE59F759DF8C617DA248798A7C20F60E26FBB1B0FC8DB47C46B098BCD26CF8CE78989ACA
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.r.a.c.k.e.t.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):16806
                                                                                                                  Entropy (8bit):7.9519793977093505
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                                                                                  MD5:950F3AB11CB67CC651082FEBE523AF63
                                                                                                                  SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                                                                                  SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                                                                                  SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):254
                                                                                                                  Entropy (8bit):3.4720677950594836
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXOu9+MlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnycMlWlzGHmD0+dAH/luWvv
                                                                                                                  MD5:D04EC08EFE18D1611BDB9A5EC0CC00B1
                                                                                                                  SHA1:668FF6DFE64D5306220341FC2C1353199D122932
                                                                                                                  SHA-256:FA60500F951AFAF8FFDB6D1828456D60004AE1558E8E1364ADC6ECB59F5450C9
                                                                                                                  SHA-512:97EBCCAF64FA33238B7CFC0A6D853EFB050D877E21EE87A78E17698F0BB38382FCE7F6C4D97D550276BD6B133D3099ECAB9CFCD739F31BFE545F4930D896EEC3
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.l.e.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):286
                                                                                                                  Entropy (8bit):3.538396048757031
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXcel8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyMelNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:149948E41627BE5DC454558E12AF2DA4
                                                                                                                  SHA1:DB72388C037F0B638FCD007FAB46C916249720A8
                                                                                                                  SHA-256:1B981DC422A042CDDEBE2543C57ED3D468288C20D280FF9A9E2BB4CC8F4776ED
                                                                                                                  SHA-512:070B55B305DB48F7A8CD549A5AECF37DE9D6DCD780A5EC546B4BB2165AF4600FA2AF350DDDB48BECCAA3ED954AEE90F5C06C3183310B081F555389060FF4CB01
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .s.i.s.t.0.2...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):250983
                                                                                                                  Entropy (8bit):5.057714239438731
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                                                                                  MD5:F883B260A8D67082EA895C14BF56DD56
                                                                                                                  SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                                                                                  SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                                                                                  SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):286
                                                                                                                  Entropy (8bit):3.5502940710609354
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXfQICl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXClNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:9B8D7EFE8A69E41CDC2439C38FE59FAF
                                                                                                                  SHA1:034D46BEC5E38E20E56DD905E2CA2F25AF947ED1
                                                                                                                  SHA-256:70042F1285C3CD91DDE8D4A424A5948AE8F1551495D8AF4612D59709BEF69DF2
                                                                                                                  SHA-512:E50BB0C68A33D35F04C75F05AD4598834FEC7279140B1BB0847FF39D749591B8F2A0C94DA4897AAF6C33C50C1D583A836B0376015851910A77604F8396C7EF3C
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):270198
                                                                                                                  Entropy (8bit):5.073814698282113
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                                                                                  MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                                                                                  SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                                                                                  SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                                                                                  SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):288
                                                                                                                  Entropy (8bit):3.523917709458511
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:fxnxUXC1l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnySvNGHmD0wbnKYZAH/lMZqiv
                                                                                                                  MD5:4A9A2E8DB82C90608C96008A5B6160EF
                                                                                                                  SHA1:A49110814D9546B142C132EBB5B9D8A1EC23E2E6
                                                                                                                  SHA-256:4FA948EEB075DFCB8DCA773A3F994560C69D275690953625731C4743CD5729F7
                                                                                                                  SHA-512:320B9CC860FFBDB0FD2DB7DA7B7B129EEFF3FFB2E4E4820C3FBBFEA64735EB8CFE1F4BB5980302770C0F77FF575825F2D9A8BB59FC80AD4C198789B3D581963B
                                                                                                                  Malicious:false
                                                                                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.i.c.a.g.o...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):296658
                                                                                                                  Entropy (8bit):5.000002997029767
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                                                                                  MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                                                                                  SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                                                                                  SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                                                                                  SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 2511552 bytes, 2 files, at 0x44 +A "content.inf" +A "Main_Event.thmx", flags 0x4, ID 59889, number 1, extra bytes 20 in head, 90 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2527736
                                                                                                                  Entropy (8bit):7.992272975565323
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:49152:NFXdpz4d98p/q5jA4q+9Uf5kx6wHR8WfPJZVhWzH4dRze76YP9nJ7yyAInT76nSY:NFXdKx5sM9SmxHKexZVhutJJVpCSqa0Z
                                                                                                                  MD5:F256ACA509B4C6C0144D278C7036B0A8
                                                                                                                  SHA1:93F6106D0759AFD0061F73B876AA9CAB05AA8EF6
                                                                                                                  SHA-256:AD26761D59F1FA9783C2F49184A2E8FE55FCD46CD3C49FFC099C02310649DC67
                                                                                                                  SHA-512:08C57661F8CC9B547BBE42B4A5F8072B979E93346679ADE23CA685C0085F7BC14C26707B3D3C02F124359EBB640816E13763C7546FF095C96D2BB090320F3A95
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....R&.....D............................R&.8?..............Z..............M). .content.inf..,........M). .Main_Event.thmx......R..[...............=.1.^xa..^...../..^x....QA^"....^/.I.{/F..F..........6Vn. ..._Hmc......<....#.{.@.....Xl../Y....Ye..'V.f.S.Vf.T..0t+..y...5O...{.....-.dT...........!...[ .ns..k.....QAA.. ....B..u.`.....{.\u8.0.....@t........K....@..w.......>...-1F...........1.E....O............_M.m..CP.O......X......g......].../..:C...Q...i.._"...M..1o...S../...9....k;...}S........y..;1o....1h......t.CL.3...].@...T...4.6.}.....M...f...[.s.."f....nZ.W......0.c.{.`.^..Oo.[.JT.2].^.f..a....kO......Q..G..s.5...V.Wj.....e...I,]...SHa..U.N.N.....v.C.....x..J{.Z.t...]WN...77BO-J......g......3:i..2..EFeL.,n..t:..,~4gt.w...M.5.'h.L..#..A&.O.ys%K.Z....F.PW..=jH...jGB.i..j.J.^.#.\n...J@.....-5.f.1jZ68.o...H2.......$O...>..ld&,#$.&_....yl.fkP$.........l....s....i.tx.~<.z...>..2.Gx..B..z.E.3.N<....`$.....b..?.w.[.X..1.=q!.s......v.......r.w
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 2573508 bytes, 2 files, at 0x44 +A "content.inf" +A "Mesh.thmx", flags 0x4, ID 62129, number 1, extra bytes 20 in head, 94 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2591108
                                                                                                                  Entropy (8bit):7.999030891647433
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:49152:ZSBBeAefkpB5iXfQJgi7JBaCCRZ3cM2VDHkvSJO6qzI1tE9Rn:EBI6gbCkMPDHKSJO6qsP6n
                                                                                                                  MD5:BEB12A0464D096CA33BAEA4352CE800F
                                                                                                                  SHA1:F678D650B4A41676BA05C836D462F34BDC5BF648
                                                                                                                  SHA-256:A44166F5C9F2553555A43586BA5DB1C1DE54D72D308A48268F27C6A00076B1CA
                                                                                                                  SHA-512:B6E7CCD1ECBB9A49FC72E40771725825DAF41DDB2FF8EA4ECCE18B8FA1A59D3B2C474ADD055F30DA58C7E833A6E6555EBB77CCC324B61CA337187B4B41F7008B
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....D'.....D............................D'..D..........z...^..............M7. .content.inf............M7. .Mesh.thmx....&~j..[.....0.................]............ww,v.\....D......3m..m!f..0..E{..?..`..A...k.:....I..........|bmG.FS...f.;.J.vzb.......R.......-....|.......ESD.....".4M..M..t.N....y..,..#.4.5.2.......'.8.Q..3.D..T....!.......&rJg...s........(..9........Dw..'....9.-..G.c............E.. .O.....a..O.._..s..)7Wz~....bJ..D...o....0..R/.#...?.......~6.Q?....?y...g.?............TP..r-...>....-..!.6...B.....\../...2....4...p$...Oge.G.?.....S.#x(..$.A~.U.%f....dJ..S.f{.g.._..3{.fm2.....Z.\o&.[k.m....ko.8..r.-.Go.OQ..'!6..f.L...Ud.$.q*.L.....R.. J.T&4g...7.2K...#k.[.].:....lk.....;c..DRx.`..&L..cpv*.>.Ngz~.{..v5.\...'C.<R:.C8.|.fE{......K...).....T...gz}..rF..Q.dof7.....D.f=cm...U|.O.]F...5zg(.. ....S..._?D....^..+.i...Z.....+X..U!4qy..._..`I..>./.W.7......=.O....BG..=..%9|...3.?...}.$"..H..u...0.......a..:t?.....8...Z..#g.=<.e.`\......KQ..U....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 5864 bytes, 2 files, at 0x44 "architecture.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22008
                                                                                                                  Entropy (8bit):7.662386258803613
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:M7FUtfIdqSHQs7G8E0GftpBjED/C4RQrFLrHRN7TT8DlvQyUTL2mH:sWgdqR2G8Pi6D6YQZTTMvU+mH
                                                                                                                  MD5:ABBF10CEE9480E41D81277E9538F98CB
                                                                                                                  SHA1:F4EA53D180C95E78CC1DA88CD63F4C099BF0512C
                                                                                                                  SHA-256:557E0714D5536070131E7E7CDD18F0EF23FE6FB12381040812D022EC0FEE7957
                                                                                                                  SHA-512:9430DAACF3CA67A18813ECD842BE80155FD2DE0D55B7CD16560F4AAEFDA781C3E4B714D850D367259CAAB28A3BF841A5CB42140B19CFE04AC3C23C358CA87FFB
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................................architecture.glox.................Content.inf..q5.^...[.....0y......../..CL.C5.Q..U5g.z....UUUMPC...C..P....T.....=..s..4c...-3H..E...2..2*..T...../.i.;$..............%...................'h.........#0.......[........c.h.....O...%.61...[.J..:.,^....W.]$..u...N.R.....H.......:%I.g5Kd.n6...W2.#.UL..h.8NN../.P...H.;@.N.F...v."h..K.....~.....8...{.+...&.#A.Q'..A.....[NJ.X.....|.|.G5...vp.h.p..1.....-...gECV.,o{6W.#L....4v..x..z..)[.......T.....BQ.pf..D.}...H....V..[._.'.......3..1....?m..ad..c(K.......N.N.6F%.m......9...4..]?...l6..).\p;w.s....@...I%H.....;\...R......f...3~:C...A..x....X...>...:~.+..r@..."......I..m.y..)F.l..9...6....m...=..Q.F.z..u......J].{WX...V.Z.b.A0B..!....~.;Z.....K.`c..,X.MFz....].Q.2.9..L."...]...6...JOU..6...~../......4A.|.......i.LKrY...2.R.o..X.\....0.%......>H.....8.z..^....5d|...4|...C......R28.E......a....e...J.S..Ng.]<&..mm
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 3239239 bytes, 2 files, at 0x44 +A "content.inf" +A "Vapor_Trail.thmx", flags 0x4, ID 19811, number 1, extra bytes 20 in head, 111 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3256855
                                                                                                                  Entropy (8bit):7.996842935632312
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:98304:wh7I1aeH9YvgK+A+a7GiiQzP4YZDpQ2+Sd6Y:w21ay93aypQzzhpBL/
                                                                                                                  MD5:8867BDF5FC754DA9DA6F5BA341334595
                                                                                                                  SHA1:5067CCE84C6C682B75C1EF3DEA067A8D58D80FA9
                                                                                                                  SHA-256:42323DD1D3E88C3207E16E0C95CA1048F2E4CD66183AD23B90171DA381D37B58
                                                                                                                  SHA-512:93421D7FE305D27E7E2FD8521A8B328063CD22FE4DE67CCCF5D3B8F0258EF28027195C53062D179CD2EBA3A7E6F6A34A7A29297D4AF57650AA6DD19D1EF8413D
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....Gm1.....D...............cM..........Gm1..D..............o... ..........MP. .content.inf...7. ......MP. .Vapor_Trail.thmx..n...N..[......L........7...+I..x...P7/...BH..Rm.\yqi.x..B....{.m.............=.....p.%.@......BpV.[......C.4..X./..Y.'SB..........0.Gr.FG.).....R\...2..Jt..1..._.4_B..................cn7H.-.....Q...1..G{G.~.. '.$......@.(....=@=..`....@.@.A. ....'.4`. .@....D...'....S.s..9.7" /....?.aY.c.........LG....k...?_.....P.....?.1.....FB..m..t...['......:...?...W..../~..z.Tr...X.@...._....3..N..p.....b...t.....^..t...~..t.8A...t_....D..3R.Z.=..{.A.8).3-5..v.isz....0A~%.s.D.4....k.K......8......)R.}f.E..n.g&:W...'E....4%T..>......b.y..[..zI....e...j.s....F.....|7826U.C.,..BY.U.F.f......"..#.m..,..._...#.\.....gPP.2.}Kas......g..3.d0.Z.Z.]..n......MY]6.....].m..D.6...?.n.20.,.#...S...JK..#.W.%.Z4.....i..CBf...../..z......n.N...U.....8t...ny...=.!..#..SF..e...1.P..@.Qx*.f.;..t..S.>..... F..)...@.Y..5j....x....vI.mM....Z.W..77...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 3400898 bytes, 2 files, at 0x4c "Insight design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 106 datablocks, 0x1203 compression
                                                                                                                  Category:modified
                                                                                                                  Size (bytes):3417042
                                                                                                                  Entropy (8bit):7.997652455069165
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:98304:1YYkj2mRz6vkkB15AW4QD0ms+FdniD60bDUpS:qYkj7d6vP7NZDLn+PM8
                                                                                                                  MD5:749C3615E54C8E6875518CFD84E5A1B2
                                                                                                                  SHA1:64D51EB1156E850ECA706B00961C8B101F5AC2FC
                                                                                                                  SHA-256:F2D2DF37366F8E49106980377D2448080879027C380D90D5A25DA3BDAD771F8C
                                                                                                                  SHA-512:A5F591BA5C31513BD52BBFC5C6CAA79C036C7B50A55C4FDF96C84D311CCDCF1341F1665F1DA436D3744094280F98660481DCA4AA30BCEB3A7FCCB2A62412DC99
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF......3.....L.............................3..?..............j.....3.....t.4.............Insight design set.dotx.................Content.inf...QJ.N..[.........R.....L....N).J|E.B.$.B).3,...n.....JW....k.U1..M...3#.5....$^.....;vR...Z.nj...#......^*......a.{..(..o.v...!L`...T.-&jZ`.\.*0.....G.."b.m..F.X......$>%..?.D..H.l.j....$.......MrQ......q-....hx...6.D.3...j....n..U#R..3....sm?..xJr..............$G8..t.g...?.g.}......$P._...7.#..w..9DR....*lu....?..'.Ai..v.vl..`......B..N_....W./.;...c=oYW.lL'bv.......+...9.P..B=...*Y.SX=EL.5o....?H.e|.Fn.M[...d.v.....i......9..U..H....uq.Nrn..@..e...3....8.....s8}z..$........B....26...d..?.l....=.aeM.[..|n....H.;..7A.`....=.F...V.Y.l..8.........%e.x0S.....~..2..%.....U..#.r_.0V.v.6w.l.......Y.........v..o+....*sn.$^'.Il...akUU....w....~.....&8.Vwj.....Q.uQ..&..G.($.2.s.?m.B.~j.*..+G.W..qi..g..5.)){O........o.ow.(;.{...y;n...J...&.F2.@.;......[{'w..........`....czW.........?W...}..w....x..........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 243642 bytes, 2 files, at 0x44 +A "content.inf" +A "Metropolitan.thmx", flags 0x4, ID 19054, number 1, extra bytes 20 in head, 24 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):261258
                                                                                                                  Entropy (8bit):7.99541965268665
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:9blShNYrHNn0JU+D+kh8CIjXHWC7X0nZLC9Ge2KY/WfI:9ZSTYrtn0Sk+CIDHWC7chVKYx
                                                                                                                  MD5:65828DC7BE8BA1CE61AD7142252ACC54
                                                                                                                  SHA1:538B186EAF960A076474A64F508B6C47B7699DD3
                                                                                                                  SHA-256:849E2E915AA61E2F831E54F337A745A5946467D539CCBD0214B4742F4E7E94FF
                                                                                                                  SHA-512:8C129F26F77B4E73BF02DE8F9A9F432BB7E632EE4ABAD560A331C2A12DA9EF5840D737BFC1CE24FDCBB7EF39F30F98A00DD17F42C51216F37D0D237145B8DE15
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D...............nJ...............D.................."..........M. .content.inf....."......M. .Metropolitan.thmx...cVtP..[.....`Q..B.....=.T.....h.."...Z..|..}hZK.V....Z..Z................?..v...[S$."...H......^u.%.@...>....... f.........1.5......*&lm.tZ.msz:...Noc....1....D .........b..... ..3#pVp....}oo]{m......H*[%i.GNHB1D<......(*# ....H"....DP..b(B.<.....v......_..`.7..;.}............/.p}.:vp....~l0..].........S....G?.....}..U.;......dNi..?........-c..J.z....Z...._.O.....C..o.,......z....F....sOs$..w9......2G..:@...'....=.....M..am.....S......(`.._....'......[..K"....BD...D...^1k.....xi...Gt....{k@.W.....AZ+(,...+..o......I.+.....D..b. T.:..{..v.....g..........L.H.`...uU~C.d...{...4.N.N..m8..v.7..3.`.....,...W...s.;.fo.8.Y...2.i...T&.-...v8..v.U.Y=...8..F.hk..E.PlI.t.8......A.R....+.]lOei..2...... gS*.......%8H.....<.U.D..s.....>.....D_...../....l.......5O1S~.........B.g.++cV.z.f .R.Z.......@6....(..t^5"...#G...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 206792 bytes, 2 files, at 0x44 +A "content.inf" +A "View.thmx", flags 0x4, ID 33885, number 1, extra bytes 20 in head, 15 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):222992
                                                                                                                  Entropy (8bit):7.994458910952451
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:k8/c2cF9GTLqsTmYstUdx+dwb2ooiVOfiI17zWbQ:jbzqGdpbZ/Mf3h68
                                                                                                                  MD5:26BEAB9CCEAFE4FBF0B7C0362681A9D2
                                                                                                                  SHA1:F63DD970040CA9F6CFCF5793FF7D4F1F4A69C601
                                                                                                                  SHA-256:217EC1B6E00A24583B166026DEC480D447FB564CF3BCA81984684648C272F767
                                                                                                                  SHA-512:2BBEA62360E21E179014045EE95C7B330A086014F582439903F960375CA7E9C0CF5C0D5BB24E94279362965CA9D6A37E6AAA6A7C5969FC1970F6C50876582BE1
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....'......D...............]............'..H?..........z..................M{. .content.inf..l.........M{. .View.thmx......R..[...........@...G...I..(J.....B....Q!....}Ju..(BR..._|.5.%.....6m...........?.w{.rm,....#....;Ba#.:v...Dv.."u.v{!...f}......!......:.S.......".z.f.......==.n.0Km0eh.Kbm.C.r.6.........d..h.....{..w..}....2sb...rvm..x...0(..B... ...BH.r#.@..d".*..F+...Q.sx.....?...d.d.eZ2W2.2d...q.I....4.e4....#.....K...3...1.p.y......>.~V....cm....n^..b.{..._D?..AG...'...k.L&..h}=p.....Wl....(.......>.~.].....'.4.W{......../......7.....'.s...w...6..hn..e.2.).l]u.v4...GF.X..X..X....G.i.\..y.g&.<&ti......Sp,j.....>I..S..%.y..........S..-).+...>...D..............[...d...jt.~<x.a(.MDW..a..ZI.;+..!,.$...~>#...).R4...K.$.Zm......b...........{..._..A{.}..r...X...T.ZI.T.).J...$.".U,.9...r.z.)......}...()<....m....QS.p...;?..5.W~2r.EZu..P.1.%'l.........+/6.Mm.|2....Ty..f.o.S.....3J.._...X,..m....:..1.<GqFy.QA9W4.=....n...ZP...O.\.[...:8.%.^..H.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):276650
                                                                                                                  Entropy (8bit):7.995561338730199
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:H2a+HFkDF8gpmMt4kzwVVqhSYO6DITxPWgJl1CFExwXyo7N:mlZgFtIVVTuDExeWuv7N
                                                                                                                  MD5:84D8F3848E7424CBE3801F9570E05018
                                                                                                                  SHA1:71D7F2621DA8B295CE6885F8C7C81016D583C6B1
                                                                                                                  SHA-256:B4BC3CD34BD328AAF68289CC0ED4D5CF8167F1EE1D7BE20232ED4747FF96A80A
                                                                                                                  SHA-512:E27873BFD95E464CB58B3855F2DA404858B935530CF74C7F86FF8B3FC3086C2FAEA09FA479F0CA7B04D87595ED8C4D07D104426FF92DFB31BED405FA7A017DA8
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):295527
                                                                                                                  Entropy (8bit):7.996203550147553
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:nwVaEqsf23c9shf6UyOGgDWDn/p3fd+zkPWnvGL3n9bQnkmVheyqtkl:MlPfW6sVEDn/pPdhWnvGL36zyyqal
                                                                                                                  MD5:9A07035EF802BF89F6ED254D0DB02AB0
                                                                                                                  SHA1:9A48C1962B5CF1EE37FEEC861A5B51CE11091E78
                                                                                                                  SHA-256:6CB03CEBAB2C28BF5318B13EEEE49FBED8DCEDAF771DE78126D1BFE9BD81C674
                                                                                                                  SHA-512:BE13D6D88C68FA16390B04130838D69CDB6169DC16AF0E198C905B22C25B345C541F8FCCD4690D88BE89383C19943B34EDC67793F5EB90A97CD6F6ECCB757F87
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 252241 bytes, 2 files, at 0x44 +A "content.inf" +A "Frame.thmx", flags 0x4, ID 34169, number 1, extra bytes 20 in head, 16 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):271273
                                                                                                                  Entropy (8bit):7.995547668305345
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:zfdvQnJMwXse4Vradf3mrC7woyWbjKlCVC7K:zfJwJse4VrS1AK
                                                                                                                  MD5:21437897C9B88AC2CB2BB2FEF922D191
                                                                                                                  SHA1:0CAD3D026AF2270013F67E43CB44F0568013162D
                                                                                                                  SHA-256:372572DCBAD590F64F5D18727757CBDF9366DDE90955C79A0FCC9F536DAB0384
                                                                                                                  SHA-512:A74DA3775C19A7AF4A689FA4D920E416AB9F40A8BDA82CCF651DDB3EACBC5E932A120ABF55F855474CEBED0B0082F45D091E211AAEA6460424BFD23C2A445CC7
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....Q.......D...............y...........Q...XJ..........{..................M.. .content.inf.(..........M.. .Frame.thmx.1....b..[.........B.....6....ZZ}....BH..-D..}..V.V-........Z..O.....H.f..........;..@d.`......!..=;.,bp..K.q....s.y....D.qZ)p......D...r.S....s=B.4.).8B....4.a6 ...~........."....#.....}....n.Q.1cH.%c/.U....E..E...!..Da*.p....X..G..:.....1.@.....W.'...._........W.c...<.v.k.....&.8......?.h.>d._:-.X.......9..tL}........3.;.N3.D~......>.^?..|:...}......oT.z.......w..[..}:...._fu........Kk.......L..9..p..e..^......K.%...Mapqhvv..E&.^.....[...9|"l...9...U......!..w..Nya...~C.yx...w.K..q.z.j.W?t.......DY.x.S2.....]..na.Qj...X.K..^...S.hK.W...Z....s.0...NF...8C.......j.'Zc...k.%...l....S.....OW..o.Qf.x...X.;<.rO].....W.m.e....T.1.6........".....Q.3........l..v.."..I...&......w..4vE...c.s[.3.m..8.q$.....a...)...&:6..,..#..?....;.!.....~.UP.r=.}h.&U......X...]..X.e\u.G<....E....lG.@.*Z...10.D@.]....z+-.S....p..Y.PK.:.S..p.....1E`..-
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 214772 bytes, 2 files, at 0x44 +A "content.inf" +A "Parcel.thmx", flags 0x4, ID 26500, number 1, extra bytes 20 in head, 19 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):230916
                                                                                                                  Entropy (8bit):7.994759087207758
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:OTIPtMXmJWnzPS3pqnkeuJXW+FNx1a72rLiQxEBTR:750nz63/FJRFLISnp+Bt
                                                                                                                  MD5:93FA9F779520AB2D22AC4EA864B7BB34
                                                                                                                  SHA1:D1E9F53A0E012A89978A3C9DED73FB1D380A9D8A
                                                                                                                  SHA-256:6A3801C1D4CF0C19A990282D93AC16007F6CACB645F0E0684EF2EDAC02647833
                                                                                                                  SHA-512:AA91B4565C88E5DA0CF294DC4A2C91EAEB6D81DCA96069DB032412E1946212A13C3580F5C0143DD28B33F4849D2C2DF2214CE1E20598D634E78663D20F03C4E6
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....F......D................g...........F...?..........|..................L.. .content.inf.zG.........L.. .Parcel.thmx.>2...R..[...0...........7....B+...BH....{...^.../.....B{...1....+".....<.....$........{.......sD"..j...}... P..w..U..f...6.x8. ...C..F.q.7....T.6p......B.P..L..g......A..43.W`.....{{...u.4...:.bb.4"X..m..)$..@(H. H.tBPTF..,.&.B.'...6..2...n..c%...Z@.(.@.......(.<i.i....P......?......o.......F.M.L......i.....C..7..../.....MQ.0..l.U.s.Fu.......1...p.;.(.}..ogd..<.._.Z......._.......O.J......97...~<...4.c....i..........'k.5.......Q.$..C..E... ..5.7....N.a.[ns6hi..kM....?....X......*9q...!O\....0....n.^s.9.6..............;. ..r...rf..C6z..v #.H...O...v/.sl....J.m%.L.Dp.e....*uO..g.y....f...].5.*........W.....h^[..w.|.=.ru.|.M..+.-.B...D.Ma....o.<X SnI....l...{..G..,..y5\W.@..y.;.y ...M..l.....e..A...d.e!.E..3.......k1.......6gY).../....pQ..?..s.W.)+R.S5..../.0..vz.^.......k.....v..9..A.NG...N~#..$.B...*s,(.o.@.ar.!.J.....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 291188 bytes, 2 files, at 0x44 +A "Banded.thmx" +A "content.inf", flags 0x4, ID 56338, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):307348
                                                                                                                  Entropy (8bit):7.996451393909308
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:6144:7vH3uG+yiWx0eVJyORloyyDqnHefzOs81MrXLXx7:b36yiWH/LRS2CJl1
                                                                                                                  MD5:0EBC45AA0E67CC435D0745438371F948
                                                                                                                  SHA1:5584210C4A8B04F9C78F703734387391D6B5B347
                                                                                                                  SHA-256:3744BFA286CFCFF46E51E6A68823A23F55416CD6619156B5929FED1F7778F1C7
                                                                                                                  SHA-512:31761037C723C515C1A9A404E235FE0B412222CB239B86162D17763565D0CCB010397376FB9B61B38A6AEBDD5E6857FD8383045F924AF8A83F2C9B9AF6B81407
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....tq......D...........................tq.. ?..........|..................Mn. .Banded.thmx............Mn. .content.inf..;.u.i..[...............?....^.j.{j.B...$M/!...W....{!..^0x/.6...&............w......$.B..J.?a.$=...P..L...d..........+./.\..E:h.....-.$..u-.I..L\.M.r..Y..:rtX:....8...........+8.}{......&.-..f.f..s3-P.''.r...Z-"/E../...^%^N(,.$..$.H..O........q>...|.|......y..m.)u....`.....z.n..-.[.5....xL....M...O..3uCX..=4.....7.yh...dg.;..c.x.4..6..e..p.e"..,.!.St{..E..^I.9j....;..`.Y..#.0..f...G.....9~./....QCz.93..u%hz.........t9.""........)..7K.c~E!..x.E.p...[......o..O.j.c.......6.t{...".....t9V;xv....n<.F.S2.gI.#6...u..O..F.9.[.L.....K....#..zL..I...o....k...qog.......V..BKM..#.bET.)..&4..m.w...*....E.a[.Q.y.B...w...r.nd...)...<..#..r[4.y...#.z.....m?.2K.^...R{..m..f......r?]..>@...ra$...C+..l].9...."..rM9=......]".'...b&2e...y..a..4....ML..f...f"..l..&.Rv=2LL..4...3t_x...G....w..I.K....s.t.....).......{ur.y2...O3.K*f.*P(..F..-.y.Z...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 704319 bytes, 2 files, at 0x44 +A "content.inf" +A "Wood_Type.thmx", flags 0x4, ID 5778, number 1, extra bytes 20 in head, 51 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):723359
                                                                                                                  Entropy (8bit):7.997550445816903
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:12288:NPnBZX7wR3tMwYqNDQGnXTtfzO5U7yo6O7bLhe8yE3LLDok4a:JBMbYE7xzO5U917bLh/DL3oJa
                                                                                                                  MD5:748A53C6BDD5CE97BD54A76C7A334286
                                                                                                                  SHA1:7DD9EEDB13AC187E375AD70F0622518662C61D9F
                                                                                                                  SHA-256:9AF92B1671772E8E781B58217DAB481F0AFBCF646DE36BC1BFFC7D411D14E351
                                                                                                                  SHA-512:EC8601D1A0DBD5D79C67AF2E90FAD44BBC0B890412842BF69065A2C7CB16C12B1C5FF594135C7B67B830779645801DA20C9BE8D629B6AD8A3BA656E0598F0540
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....?.......D...........................?...`J..............3..............M.. .content.inf..+.........M.. .Wood_Type.thmx......r..[.........................!.wwwwqwwwwwwwwwww..."....+......nR..x..\..w..r.5R.....(|.>.$e3.!..g....f..`9NL......o./.O.bxI...7.....|........6.n."J.....4^g.........?...................o.......s3.....8. .T.j...._.Z.Q.t.k,(o.c.t.......?Z....`o........?.a....6.)....6b..../.t...........Mz....q}......C.......+{.......o...K.tQjt............7.._....O.....\....` ..............@..`....%..t....V.]........m..m....u..1.yr;..t..F.'..+{....zqvd.g._..$H..Vl...m..../....g..rG.....:*......8....h...[...a06...U.W....5.Z.W..1I..#.2.....B3...x....$PRh...\{J.c.v.y..5+Y.W.N..hG......<..F..W.d8_....c...g....p|7.]..^.o.H.[$Zj..{4......m.KZ..n.T%...4.Z..Y."q7?kuB......U....).~.......W%..!.e.U.mp.o...h...?.w...T.s.YG#......Y.}....Z.O.i.r,...n..4.\....P..m..=....f........v....g....j...*.wP..4.VK.y.z...C..oum.b.1......?.Z.>.7.!?......A..Q>..Z....-
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 15461 bytes, 2 files, at 0x4c "gostname.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31605
                                                                                                                  Entropy (8bit):7.820497014278096
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:7SpOUxgQ9gFodHZktfHa2TSmcAg76j8/xorK0JoZgbA8E0GftpBjE2PzFLrHRN7S:OngHltf7Bcp/xoB3A8Pi625D8RA54
                                                                                                                  MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
                                                                                                                  SHA1:1AC85B369A976F35244BEEFA9C06787055C869C1
                                                                                                                  SHA-256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
                                                                                                                  SHA-512:BEA70229A21FBA3FD6D47A3DC5BECBA3EAA0335C08D486FAB808344BFAA2F7B24DD9A14A0F070E13A42BE45DE3FF54D32CF38B43192996D20DF4176964E81A53
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....e<......L...........................e<...?...................;......................gostname.xsl."...............Content.inf.[.......[...>..|..32.E..o`h....W.>.^...v..5...m.w.$.U..U......m.mu...'4....m`.9F.. ...I..PTS..O.D...GM#...#CUE.`.`%n..N...G,.~..+.6cv.L...G.m.Y..vy.....Yh9/.m,..wtw..;....Ka.a.{.\...'.....<X....%)...G..d......R./..4$..32..@....f.h....w..ov.}w..[.....{.v.......dr..&w#G..$3.zI&f..(C..L.z5J... .`...!.!4. ...!.` .$........w.J.X7.w_..@.w..f]=.C.....I-....s.s_.x...~..A... ...z...nM..;....Z....vt....6...~.w.....*x.g.h.T.J..-.3=....G.n..ti.A...s...j$.Bf..?......6.t.<j...>.."....&=BO?w.uN.o.t.-r..K....>C..^G..p...k...>.xZ.[fL..n.."].W#...|.i.0W.q.F: ..<#w......w....s....."...n.qu.../rI.....q....P~.B..|b?.N.}..MyO..q..:q.7..-~.xa.S...|.....X.....g.W.3.mo..yy.GG.s>....qy....r........#.F.P..A.......A....b.2..14.8.i6..w.S...v~{0z.<.Z...^!.;2mSV.i....{...U...+...r.;...h.++..T6.a...$....j5F+..1t....b......|.Q\d-.S..2... ......Y..A...s....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 533290 bytes, 2 files, at 0x44 +A "content.inf" +A "Parallax.thmx", flags 0x4, ID 64081, number 1, extra bytes 20 in head, 29 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):550906
                                                                                                                  Entropy (8bit):7.998289614787931
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:12288:N4Ar9NyDhUQM0Hk86V1YnOIxQ9e6SJbj2OjK:jAG8wa5Qw6SZ2Oj
                                                                                                                  MD5:1C12315C862A745A647DAD546EB4267E
                                                                                                                  SHA1:B3FA11A511A634EEC92B051D04F8C1F0E84B3FD6
                                                                                                                  SHA-256:4E2E93EBAC4AD3F8690B020040D1AE3F8E7905AB7286FC25671E07AA0282CAC0
                                                                                                                  SHA-512:CA8916694D42BAC0AD38B453849958E524E9EED2343EBAA10DF7A8ACD13DF5977F91A4F2773F1E57900EF044CFA7AF8A94B3E2DCE734D7A467DBB192408BC240
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....*#......D...............Q...........*#...D..........~..................M{. .content.inf............M{. .Parallax.thmx.9... y..[......(..b.P...E.Q*.R.".RTH.%.T..F......u.{.*+.P.....FK*0].F...a{...D4`D..V.../.P,....2.Mx...u......0...E...{A-"J...)jl_.A..T......u.Y....ZG:....V.A.#~.. ..6..............o..X..<.... .......C.ce.f!nA.).p...p........n..................'6w6H6s.j....l...{?.h..........]..l.....v....%..l}A..................3...W_73.j......6...F.../..qG.?........H..).........7.&km....`m2..m.W.q.<../~<..6*.78..X~.e+..CC*w...T...6....AB..l..._.f......s.e....2....H..r.R.Z....a.,..\Q.q..._SJJ....7.S.R....=f..>....9=....NnC.....].-...\..Z..q..j...q.....Nj..^'..k...Zl.~PRvpz.J..+.C...k.z.w=l.#.............n...C..s.kM.@B{..vL.e....E..(/......f...g..=..V...}...).=s.....y!.,...X.[..[.....\31}..D%...%..+G66.j.v./.e9...P;.o.y..U+...g.g.S.../..B._L..h...Oi.._...:..5ls>>........n6.F.Q..v>..P.r:.a..Z....a...x..D....N...i..=L.u......<;Nv.X/*.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 624532 bytes, 2 files, at 0x44 +A "content.inf" +A "Quotable.thmx", flags 0x4, ID 13510, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):640684
                                                                                                                  Entropy (8bit):7.99860205353102
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:12288:eV7ivfl+kbkIrWu+2aoRjwv/cSUWauGPo2v65s4QqcT3ZCCz6CSj8aC:fdhr1+3y4MWaC2CO4V+3ZCCDsO
                                                                                                                  MD5:F93364EEC6C4FFA5768DE545A2C34F07
                                                                                                                  SHA1:166398552F6B7F4509732E148F93E207DD60420B
                                                                                                                  SHA-256:296B915148B29751E68687AE37D3FAFD9FFDDF458C48EB059A964D8F2291E899
                                                                                                                  SHA-512:4F0965B4C5F543B857D9A44C7A125DDD3E8B74837A0FDD80C1FDC841BF22FC4CE4ADB83ACA8AA65A64F8AE6D764FA7B45B58556F44CFCE92BFAC43762A3BC5F4
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................4...............?..........~..................M. .content.inf."..........M. .Quotable.thmx..^.u.n..[...............&...U..F.......UU.M.T5.UUQS..j..#>43fD.....`....Vr......19'...P..j.-...6n.0c....4$.c....$.4.k3aQ$.lCN.#.[.."qc....,Z...,Qt@!.@...... ...H.......9.9.y.{....[.`..s3.5.....B....W.g.d...[uv.UW..............P.8.(.?......3.....'/F...0...8.P. .O..B....K...g..L.......#s...%..|4.i....?.3b.".....g...?.........2.O23..'..O~.+..{...C.n.L......3......Y.L...?K...o......g....@.]...T..sU.....<.._.<G.......Tu.U2..v.&..<..^..e.].cY;..9.%..}...I.y.;...WM...3>.:.=.|.-.AtT2OJ.I.#...#.y....A....\]$r...lM.%5.."...+7M..J.....c...".&$.... Y.r.B;..81B. +H...b....@7K.*.F.Z...v..=..ES.f.~.."...f..ho.X.E.a`~*...C>.&..@\.[....(.....h..]...9&...sd.H .1.x.2..t.rj..o..A..^qF.S9.5.....E.{...C|.w.c/V...0Q.M...........O.7;A4u...R..Z.B.7a.C`....p.z.....f!|.u.3t....2e.wWH..'7p....E_...e.._;..k....*&E.^.f=V..{*..al.y:.4a...+.g...-..>e
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 682092 bytes, 2 files, at 0x44 +A "Berlin.thmx" +A "content.inf", flags 0x4, ID 46672, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):698244
                                                                                                                  Entropy (8bit):7.997838239368002
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:12288:bUfKzAwwP7XAMWtr4FvMRt4lX0hnBdThiSb32+TdysrQgn7v4EemC6:sr7AMkJ34xu1bm4ZrQaY6
                                                                                                                  MD5:E29CE2663A56A1444EAA3732FFB82940
                                                                                                                  SHA1:767A14B51BE74D443B5A3FEFF4D870C61CB76501
                                                                                                                  SHA-256:3732EB6166945DB2BF792DA04199B5C4A0FB3C96621ECBFDEAF2EA1699BA88EE
                                                                                                                  SHA-512:6BC420F3A69E03D01A955570DC0656C83C9E842C99CF7B429122E612E1E54875C61063843D8A24DB7EC2035626F02DDABF6D84FC3902184C1EFF3583DBB4D3D8
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....lh......D...............P...........lh...?..........|..................M. .Berlin.thmx............M. .content.inf..lH.lj..[...............7.I..)........P..5x.B/^y5.xk^^......D.F........s....y...?D.....*.....&....".o..pl..Q.jm?_...6......=%.p.{.)S..y...$......,4..>#.........)..."-....K....4.E...L=.......4..p.c..nQ.0..ZO.#.....e.N..`U......oS....V..X[t.E)|.h..R....$..}.{.F.7....^.....w.,...5rBR.....{.......mi...h.b......w+..;.hV......q..(.7&.Z.l...C."j........[-E4h.....v&..~.p$|\X...8.....Fj'%,.)6w...u|C..,y..E..`*Up../(....2.(....Z.....,.'...d..s..Z....5.g.?Nq..04...f...D.x....q+.b.."v`{.NL....C..... ..n......1N+.I.{W9....2r.0...BaC.....O..=...k..."..8.D\jK.B...Aj....6,B..2...I.. B..^.4..1.K+.....DP...Mr....9..x[...>........?.Zd..'._2.._..>..'.F..#.w...2..~.|........q_Wy.W.....~..Qex.km/..f......t.q..p..gm.|.x.... ,.#\Z....p....a.}...%..v.J.Es......I.b.P?...0......F.x....E..j..6.%..E..-O.k...b .^.h.Cv...Z....D.n.d:.d.F..x...[1...B..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 1049713 bytes, 2 files, at 0x44 +A "content.inf" +A "Savon.thmx", flags 0x4, ID 60609, number 1, extra bytes 20 in head, 37 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1065873
                                                                                                                  Entropy (8bit):7.998277814657051
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:24576:qehtHA3nsAOx7yN7THwxdGpkw8R60aTcua5U4c:hhmnsBMNAxdGpV5za5Uv
                                                                                                                  MD5:E1101CCA6E3FEDB28B57AF4C41B50D37
                                                                                                                  SHA1:990421B1D858B756E6695B004B26CDCCAE478C23
                                                                                                                  SHA-256:69B2675E47917A9469F771D0C634BD62B2DFA0F5D4AF3FD7AFE9196BF889C19E
                                                                                                                  SHA-512:B1EDEA65B6D0705A298BFF85FC894A11C1F86B43FAC3C2149D0BD4A13EDCD744AF337957CBC21A33AB7A948C11EA9F389F3A896B6B1423A504E7028C71300C44
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....q.......D...........................q... ?..........{...%..............M. .content.inf.Q_.........M. .Savon.thmx...O>.o..[..............&.5....UUcC.C....A...`TU...F....".54.E.....g.-.7-D....1g...p.6......@..w(....h'?.....(..........p..J.2n$4.........A......?...........@.C.W.R.5X..:..*..I..?....r.y..~!.....!.A.a...!........O.........5.x<C...?.?....C.C.......'....F../....../.$................4.7...................P...(.w.}6.........7.....01.1r........._..?.............'.._..JOx.CFA<.........*0..2.?...>F.../...;..6-8..4...8&yb....".1%..v'..N...x......}.gYb..~L.....f[..!......Y.G.....p..r...?.p...F.Vy.....o.Whll...+...M.V...:.]...B.%.H....n..@.].zaVxf...y{.@....V.t.W....$Kp-.....7W.J..h..0A3mK.=.ub..R...W......*'T2..G#G,.^..T..XZu...U. ...76.d..#.I.JB.v...d...%.....6..O.K.[.:.L.\.....1.D..2a.>f......X...b5...ZgN.u.f...a!..."...sx....>..?.a.3.8.^._q..JS1.E..9..Lg.n.+....lE.f:j.9)Q..H1=..<.R.......{c>:.p[..S.9h.a.gL.U....8.z..z.!.....2I.~.b..2..c...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 937309 bytes, 2 files, at 0x44 +A "content.inf" +A "Gallery.thmx", flags 0x4, ID 44349, number 1, extra bytes 20 in head, 34 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):953453
                                                                                                                  Entropy (8bit):7.99899040756787
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:24576:9B1Onw3vg7aeYPagzbJ5Vhv6LnV2Dhl7GEYqVjcyd:vww3o7BYPJbJ5Vh6UCqZfd
                                                                                                                  MD5:D4EAC009E9E7B64B8B001AE82B8102FA
                                                                                                                  SHA1:D8D166494D5813DB20EA1231DA4B1F8A9B312119
                                                                                                                  SHA-256:8B0631DA4DC79E036251379A0A68C3BA977F14BCC797BA0EB9692F8BB90DDB4D
                                                                                                                  SHA-512:561653F9920661027D006E7DEF7FB27DE23B934E4860E0DF78C97D183B7CEBD9DCE0D395E2018EEF1C02FC6818A179A661E18A2C26C4180AFEE5EF4F9C9C6035
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....]M......D...............=...........]M...?..........}..."..............Li. .content.inf............Li. .Gallery.thmx.].(.Vq..[.....0Y..........v.....w.wwwww.wwwwww.w.....".83....y8..mg...o*..U..N(..@uD.:O<........{.G....~~.....c.c.5..6./|G .@#1O.B.............PT@...b.d.~..U....B.{.........0.H.....`.H.`..'S.......Ic..W..x...z....... .........g......._....o......S......p...$....._........._...K......x..?.6.U~...'./.r.................../.......5.8..2........2b.@j ....0.........``....H... ,5...........X........|..Y.QoiW..*|.......x.sO8...Yb....7...m..b.f.hv..b......=...:Ar.-...[..A\.D..g..u....].9..M...'.R-`.....<..+.....]...1.^..I.z..W{.._....L.. ...4;..6O.....9,.-.Vt+b/$7..}.O05.Y...-..S.....$*.....1."Z.r;.!..E.mMN..s .U...P%.[.P...cU...j...h.d.../.s..N/..:..X*...p5.7\}h.Q ..._.F.X.C..z$.nV..+.k..|.@.L...&.........^#.G.a..x..w!wx.8e+..E. i..$?9..8...:......|..[."..y..&y..?...W....s..._...3Z0c.....i.q.........1c.jI....W..^%xH.._...n.......&J..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 30269 bytes, 2 files, at 0x4c "Text Sidebar (Annual Report Red and Black design).docx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):46413
                                                                                                                  Entropy (8bit):7.9071408623961394
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:WaxA0CH65GY3+fvCXCttfR8JEBrkquwDn+QV5V+vNWBatX/xG8Pi65sMuMjvU+mQ:hne65GYOfKXMSEBrBtDnzFAI4JxP75sM
                                                                                                                  MD5:C455C4BC4BEC9E0DA67C4D1E53E46D5A
                                                                                                                  SHA1:7674600C387114B0F98EC925BE74E811FB25C325
                                                                                                                  SHA-256:40E9AF9284FF07FDB75C33A11A794F5333712BAA4A6CF82FA529FBAF5AD0FED0
                                                                                                                  SHA-512:08166F6CB3F140E4820F86918F59295CAD8B4A17240C206DCBA8B46088110BDF4E4ADBAB9F6380315AD4590CA7C8ECDC9AFAC6BD1935B17AFB411F325FE81720
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....=v......L...........................=v...?..................5u......................Text Sidebar (Annual Report Red and Black design).docx.v...............Content.inf..C,.zd..[............... .w.....b...wwww]r..W\ww...... .hh...........o.nz.....Ku.7..-.oH...h;.N..#.._.D,}......!Q$..Un.tI11..$w.r3... ..p...=.1....""..n...*/....h.A...Y..c,.Q.,......",..b.1.w..$.....l../;..J.....~.. ....+.R#....7.-..1.x.feH.@.......u...(.DQ%.wL.N|.xh...R..#....C...'X.m.....I{W.....5.C.....\....z.Y.)w..i...%....M..n.p.....{..-G9..k.bT.6........7....).....6..ys.....R.e.....0.Xk`.3..X\xL..4J"#.f...:....r..2..Y.uW..052.n.+ ..o..o..f&u.v.&9y.P..6.K..in.DU.#.~....4i..6;.5.w..i...g.(....../..0*Vh...C..//....W..:w......7.6....]....4.*9...sL.0k...zHh..2N.H...*..]..(.x.:..........Y.+...-.....&.*^..Q.sW...v..w.....k.L.e.^.W4iFS..u.....l.g'...b~:Zm...S.2.|......5S..=.............l.../|....G|.9 ..#.q...W.Q...G=.."W..'.6....I....D._.{.g.47....V.1._..<?....m............)..T.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 19375 bytes, 2 files, at 0x4c "turabian.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):35519
                                                                                                                  Entropy (8bit):7.846686335981972
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:2LFougzHaUdBKUsM+Z56zBjA8Pi6bo+ld8IX:MFodzHaULR9P7bo+l6IX
                                                                                                                  MD5:53EE9DA49D0B84357038ECF376838D2E
                                                                                                                  SHA1:AB03F46783B2227F312187DD84DC0C517510DE20
                                                                                                                  SHA-256:9E46B8BA0BAD6E534AF33015C86396C33C5088D3AE5389217A5E90BA68252374
                                                                                                                  SHA-512:751300C76ECE4901801B1F9F51EACA7A758D5D4E6507E227558AAAAF8E547C3D59FA56153FEA96B6B2D7EB08C7AF2E4D5568ACE7E798D1A86CEDE363EFBECF7C
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....K......L............................K...?...................J.......@..............turabian.xsl."...............Content.inf._.......[...T.....C4.5...E0B.]...+.-f....rc.[52.$...a..I....{z...`hx.r...!.. $...l..\....#3EF..r..c;<p...&n.\b..K..0Y..c+.2...i..B..wwY..77,...........}.q.C.......n..,.....prrx.QHy.B#..,.'....3....%1.``..hf...~...[.[n.v.s..y.vw....;..s.G293G&H....$E......m.&^..iy/.4.C...D...".(H&..&.I4._...!...... ........q.k1.d.....qc.3.c.....;.5.......y}...}&...+.WAN.,zVY.Q....V.Tz........g..H..c...E2jY...4g?.yf<....V.M.s.$..k.Id....+..?..._.\.s.k..9..I%;.yWQ..S..]..*.n<.7........=......"Q.*E.....MG..j.Yt..!U....Q.j...v.h-.~b..e&.......;...\.....:.....=..Xv1&q........6\...xw.%*.VdS..H...o...s.....+..%[../>.t..I....F.....".G|.....=....[..S..3..a.C.ZZ...tK.6N..b........)>........I..m..QE.M.nv.MVl.....vCG>,.suP.gqo.rr....J`m....J.b..},[F*....e.A.]..r....C4.?JJs6..l.].9...Q.B.~.......\d%.X ...8A....rH....&?#...^.....4.h.{>
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 1081343 bytes, 2 files, at 0x44 +A "Circuit.thmx" +A "content.inf", flags 0x4, ID 11309, number 1, extra bytes 20 in head, 45 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1097591
                                                                                                                  Entropy (8bit):7.99825462915052
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:24576:UE9BMy98gA4cDWHkSrDans3MfEE6w8OaVuCibol0j41dwD:UE9Bdy3D4keQWt7w85VuVoaj4/Q
                                                                                                                  MD5:BF95E967E7D1CEC8EFE426BC0127D3DE
                                                                                                                  SHA1:BA44C5500A36D748A9A60A23DB47116D37FD61BC
                                                                                                                  SHA-256:4C3B008E0EB10A722D8FEDB325BFB97EDAA609B1E901295F224DD4CB4DF5FC26
                                                                                                                  SHA-512:0697E394ABAC429B00C3A4F8DB9F509E5D45FF91F3C2AF2C2A330D465825F058778C06B129865B6107A0731762AD73777389BB0E319B53E6B28C363232FA2CE8
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D...............-,..............x?..........}...-...RU.........M. .Circuit.thmx.....RU.....M. .content.inf.g...&|..[......=..R.....=.*,.!QA?h..Q.!....Uk!.HJ.......VKuk.....q.w.w.U.....;...K.@.URA..0..B..|rv.ND(.`{..@.1.}...s?.....-...O.(V.w..1..a.....aW...a.Z..aX....5.I...!..........(. ./.d...me.( ..f.........w.......Xp.s....c..vB.98.....C.J......V ..ML.M...B.n.>...|....u!.5@t..q4....(K...u qL.S....>/%v%.2..TF.].e..'..-..L.N..c].a..(WU\o.%^..;...|o.6..L..[..;&....^p.Lu.sr,-.R=.:.8.>VOB...:.?$.*h.o....Zh.h....`.B.c.../K......b^...;2..bY.[.V.Q8....@..V7....I0c.cQN7..I.p..}..!..M....1K....+....9.2......a..W.V..........;.J .i......]%O.-......CeQ.0.c....MbP3.0.w..8w..Y...|...H;#.J.+M......>.`y..aWk|.i.BF.pJv;.....S..6....F.....RLG~..........J.=......"..........H.....h..o...u........M.6F?.F.p.B.>./*l....J.R..#P.....K......<iu..gm^..n...#c..zO"7M.O......4'>A..(.E.Cy.N.)....6.tx.r[.....7.......m.t..E?.....5.5.6.\..{.V.T.D.j..=~a^.I
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 3749 bytes, 2 files, at 0x44 "TabbedArc.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):19893
                                                                                                                  Entropy (8bit):7.592090622603185
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:v3Zh3VlkpSIcgbA8E0GftpBjEmm3UFLrHRN7GYvlvQyUTL2mTAp:v31qp/A8Pi6mUqGGvU+mcp
                                                                                                                  MD5:EF9CB8BDFBC08F03BEF519AD66BA642F
                                                                                                                  SHA1:D98C275E9402462BF52A4D28FAF57DF0D232AF6B
                                                                                                                  SHA-256:93A2F873ACF5BEAD4BC0D1CC17B5E89A928D63619F70A1918B29E5230ABEAD8E
                                                                                                                  SHA-512:4DFBDF389730370FA142DCFB6F7E1AC1C0540B5320FA55F94164C0693DB06C21E6D4A1316F0ABE51E51BCBDAB3FD33AE882D9E3CFDB4385AB4C3AF4C2536B0B3
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................c...............TabbedArc.glox.....c...........Content.inf.;....Y.[.........B.....?.T..ZD...........^C...U.R<Z....z+.I.....Z..-.V...f.....lB..\P.....=.-p....w ...\.kD..x'v..T..A..............".8...d.........FD.ZL.h..T...bp.)9B.v..i..VX...&..\..7.s..qy...l........Rty.Y...rU..>.9...8....L..\.^x.kDU.|TJ..{kN.G..E..$.kvy?.. mv......P..4.....q.1.6<u....e..dD...4.1E..Xi.5.=....1.P.c.K~S...YMO:.?..cL.g.tq\.(b1....E..0A.i..C...BT.m.S......:...}.&U..#QL..O.O../..K......=..........0a..O............BYP......>f.......iu...7.K..;QO~.t....%N.s.]>~#../7YN.....C..9.=cY.......y..U5.....,.....u.....#_..SG.`NR*.....?*..d.R.k.rX$...&.... ..h.4T.D^k-xA...............Hz..ep)e..4..P."fo Ne...o.....0n.Exr.........H..v...A.."..%)2......5...".}j.o8...E.HRQ;}.. .._L.+.jz....{.U..}...=B.o.^..vZ.:5.Z.M....y{\(...N..9...EB*MG...!N.vy..^...nE..2..@.;.4..C..t.4....h..O.8.=.m./...|Lu.|mCU..b.^.n39.h[M...%D{..w.1
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 6005 bytes, 2 files, at 0x44 "HexagonRadial.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22149
                                                                                                                  Entropy (8bit):7.659898883631361
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:b98FG/zdCbf7BOEawSi8E0GftpBjEPTFPxFLrHRN7S5ll7PK/pA2:N/zAbDae8Pi6PFPSRIA2
                                                                                                                  MD5:66C5199CF4FB18BD4F9F3F2CCB074007
                                                                                                                  SHA1:BA9D8765FFC938549CC19B69B3BF5E6522FB062E
                                                                                                                  SHA-256:4A7DC4ED098E580C8D623C51B57C0BC1D601C45F40B60F39BBA5F063377C3C1F
                                                                                                                  SHA-512:94C434A131CDE47CB64BCD2FB8AF442482F8ECFA63D958C832ECA935DEB10D360034EF497E2EBB720C72B4C1D7A1130A64811D362054E1D52A441B91C46034B0
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....u.......D...........................u....?..................................HexagonRadial.glox.................Content.inf.........[.....`........./.mT.T6...CP..z5...0.PcUmCUSUCU.Q.P.0..f............^...H..2e.[..8...ld......*F.%.j.w!R..NA.L............ .r..z....$&.........P.=.r...O...e..dfv_.i%.C....^......?..x...+d..].B.3..EU...|Cc..z.`lQp..fr.....8!;.8.p.ZwH\.........~..T.t..]..H.]..S.2..Vt.....r.H../..-8........!:.Y&..|A..J.U...-.%..k..U...4m.. .q../..b.8.vc~......_q1.?..Bh.v.....L..I.$I..s.".u.. Y....I^5.v...3.......].^)b.t.j...=...Ze~.O...|.}T.._9c........L....BV.^......X..?.....{.>.j..5.m...d.7........g[..f.nST...i..t..|.T.jjS..4p.Pxu..*..W...|.A)..|9;....H.e.^.8D..S...M..Lj.|...M.m+..H.....8.&-....=.L.....n.v..M.9...l....=r......K.F.j.(.(xD.3..r'9.K..-...5..Z..x....._....a[...J...`.b_a\\j.ed..\.3.5....S.T...ms.....E...Xl.y.LH=...}..0.T...04.4..B[..H.....B{B9.h..=.8Mn.*.TL.c..y.s.?.c9$l...).h).6..;.X../_>Pl...O...U.R..v.dy$A
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 4967 bytes, 2 files, at 0x44 "TabList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21111
                                                                                                                  Entropy (8bit):7.6297992466897675
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:wWZsOvbMZGgbA8E0GftpBjEtnFLrHRN7Dfll7PK/pirk:xZRvuzA8Pi6t9DPISk
                                                                                                                  MD5:D30AD26DBB6DECA4FDD294F48EDAD55D
                                                                                                                  SHA1:CA767A1B6AF72CF170C9E10438F61797E0F2E8CE
                                                                                                                  SHA-256:6B1633DD765A11E7ED26F8F9A4DD45023B3E4ADB903C934DF3917D07A3856BFF
                                                                                                                  SHA-512:7B519F5D82BA0DA3B2EFFAD3029C7CAB63905D534F3CF1F7EA3446C42FA2130665CA7569A105C18289D65FA955C5624009C1D571E8960D2B7C52E0D8B42BE457
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....g.......D...........................g....?..........}.......................TabList.glox.................Content.inf....t....[......@..C...../.U5...........6...`.....T..>3.................=..09`..t......a..Y..BI.Z....=.'0...%...T..........H...>.:A.r......n..p...Pf.h...I.8... ....M.]&.#.vv'.....[c......g....>"......<c..f....i...sb!Z..iu<.%|......q.....G28.h-...7.....W.v...RtdK..F~.0.3.'.e..b7.c......a.3.....a\..]...gp8.+.u/}.w.qF........8.=.=|....\~..S.-q}]0...q.B.H.^J...!...a'.2Tn!..."..%........=.e_-.....{o..%o...a`.w..L.5..r.....e.8...pO..RE.Wgr..b.%.E...O.......8s...E....Um].C..M.....[...H.FZ..4...eZI.$..v.3<]..r....B..............8i......e<.D...Q4.q.^S.....H.b.......r.q..0o.......2..PP,."...JI...xU`.6f..K..Q9.Q..h..t....AI.S6...7............X..`dv..r..S....),7ES....#.....(...\.nh...X.ps%l..F...."<_....q....v........_.e.....P.........|&..fi..4..@..^0..v.]7.......^. ."..}(...w.g.X...=<....p.......L...P..XV....@:....N...Y....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 5647 bytes, 2 files, at 0x44 "RadialPictureList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21791
                                                                                                                  Entropy (8bit):7.65837691872985
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:PWew5RNDcvPgbA8E0GftpBjE0hsyaFLrHRN7BD9lI66YR:P3GRNDcEA8Pi60hsyABDo66g
                                                                                                                  MD5:7BF88B3CA20EB71ED453A3361908E010
                                                                                                                  SHA1:F75F86557051160507397F653D7768836E3B5655
                                                                                                                  SHA-256:E555A610A61DB4F45A29A7FB196A9726C25772594252AD534453E69F05345283
                                                                                                                  SHA-512:2C3DFB0F8913D1D8FF95A55E1A1FD58CE1F9D034268CD7BC0D2BF2DCEFEA8EF05DD62B9AFDE1F983CACADD0529538381632ADFE7195EAC19CE4143414C44DBE3
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................................RadialPictureList.glox.................Content.inf....8....[.... $nq......C...../U..........a......S.Q...Q....j............(..z,.g.........^...Y..D... #i.TH5.<.=N..$..7.p".7.............`.3..1~,=,(.d8.Z.1....4'G.....!W^gClf._j.-N..&k.....Y3` =.(S..B^...i.zB.U....0O..h...I.(.......L...5.X.8.Sc<=>w.=.?&.....mR.......x.......mpW.T..^.FU...SN.C)......vsa.,x......,....E..i>..[g...#t...M..GR.9..$/4.:..q.bc9..x{bC.0..K.)..t.Y.&.v.d.16.B..c..or..W.,.B.........O.0..k.v........*F+..U.w...d...o8......A).}...#......L.!?.U.r.^.$...e.(..PG)8..+.9.5.l}.)..b.7+. 4....-.lC...|..j..Q.,.....7.W...|;j...%...:...|H..........<..%...K.....Fy.q$.k..}..8.9.M.u.?$].......r.....e.|..._..iT.;Dq5[....f.s..P.......e.T....!Y{.....t.wm..A..w-..7...3..T.:8.4.a[.Oo.. V.l.@.}..........E.&..J.....+..+.9)9<.._R.Hb.....V..Qu....:v.t.Li.0..J..V..b...!..N....-mD..c..(.[&o>.M.b..H.q..lk../..........W.8..z..B...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 1291243 bytes, 2 files, at 0x44 +A "content.inf" +A "Droplet.thmx", flags 0x4, ID 47417, number 1, extra bytes 20 in head, 54 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1310275
                                                                                                                  Entropy (8bit):7.9985829899274385
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:24576:NN3M9UHpHZE4aubaPubP3M6d71FdtmFAjq+54/79LVzG+VnS:NN3M9UJHZE4abPyU4JtmFCq+q/7JlVS
                                                                                                                  MD5:9C9F49A47222C18025CC25575337A965
                                                                                                                  SHA1:E42EDB33471D7C1752DCC42C06DD3F9FDA8B25F0
                                                                                                                  SHA-256:ADA7EFF0676D9CCE1935D5485F3DDE35C594D343658FB1DA42CB5A48FC3FC16A
                                                                                                                  SHA-512:9FDCBAB988CBE97BFD931B727D31BA6B8ECF795D0679A714B9AFBC2C26E7DCF529E7A51289C7A1AE7EF04F4A923C2D7966D5AF7C0BC766DCD0FCA90251576794
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF...........D...............9..............XJ..........}...6..............M.. .content.inf............M.. .Droplet.thmx..m7.>J..[...............2.QQPIj.*.."o^R.H5*^...^(e.W...R..x..^`..m...."..+.....{o.......Q.-....$V.N>...T]..L.... ..N.h..dOY.......S......N.%.d..d....Y.....e..$...<.m...`............@....=.z..n..[...,G..1Fn.qPDH{C<...3.Q...2..r..*...E.E.E.ErM"&a..'..W....:...?I..<.I..6o.`.d.?!..!..._.4\.._.E..).._O.S....; ..#..p.H.....c....o\.K..?$U.e.........!...J.v.....gNe._..[....#A.O.n_.....gm:P._.........{@..-g..j.69b.NH.I.$Hk?.6.n...@......'.C.._.U..:*,j.-G.....e.#.Sr.t.L......d[.[...s.....rx.3.F[.5o..:....K*.x..)M.fb...3IP.&h.Q.VX^%U.......x..l......@6.k.P..zSW.?....F..[L...4..b.l.w."&.....`.j...i.5}".~.-.....{\.:...o.'H\*+)....3.Y......\...f:.;....e........4't7..f...w..j...3....N..9`.J...P..?.....=3_.y]...f.<.......JM5.}Q/ .F.a..Z.._yh......V..>m .......a....f....!.hz..\.....F_..'z...,....h.=.......=.o..T....3.e..........$..g.2.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 10800 bytes, 2 files, at 0x44 "ConvergingText.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26944
                                                                                                                  Entropy (8bit):7.7574645319832225
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:sbUX16g8/atF4NB3TJOvqeMRD/8svIZj/OwgbA8E0GftpBjEYwFLrHRN7mYll7PY:sbhg8yY4nMZK2hA8Pi6Yum4IVR
                                                                                                                  MD5:F913DD84915753042D856CEC4E5DABA5
                                                                                                                  SHA1:FB1E423C8D09388C3F0B6D44364D94D786E8CF53
                                                                                                                  SHA-256:AA03AFB681A76C86C1BD8902EE2BBA31A644841CE6BCB913C8B5032713265578
                                                                                                                  SHA-512:C48850522C809B18208403B3E721ABEB1187F954045CE2F8C48522368171CC8FAF5F30FA44F6762AFDE130EC72284BB2E74097A35FE61F056656A27F9413C6B6
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....0*......D...........................0*...?..................t,..............ConvergingText.glox.....t,..........Content.inf..C..)t-[.....@.........=...xxA. ...E^....x.x.^.......x..^^...DF.......s..d.P.....5.;..]...2.t.w.....O9.G..;.'.T....@I.,.q.u.3..P...9... ....`J.......g.(....).,.h0.....$.3..;.._.....~.de.jj.....U..K.0....`.@.H.1.x.Z.@..q....?....x.wW.....+am8A".....I..)..]...s..-z.2S+|.Cb.t6f],.n.LV......OVg....O.at|..-..x.....:....]s...u..g}.P..v.3....^.".%..%...#.2.....l00...n.......r8.p.....^.....n.)..,..t.^$b...b.q.W...F..R...n.-.+..'........Aw=._OwH....8.:s..{.#..{N.hW..`.._........Wy....>U.?....-.8tg...=..y..@.,.v|......l...t..l#{...H....9..|......~...De..#@y.&K....U...q.c.zK..D.<pV.....Ql..&Y...=#...w....r.`#2....Ug.J(..T...KmW.@...!....j:......M......!..E.7#s.t..F.aU..N....-.i......|w.lr..G.n.,.......=Kl.-m.?F.....v]?.......{q.U.t...<.|..u.....3R.`.t.T.>;v.....KQ...S...7..1...N.kN.y.)v.....3H:..D.{.+.(......u..^W&.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 1865728 bytes, 2 files, at 0x44 +A "content.inf" +A "Damask.thmx", flags 0x4, ID 63852, number 1, extra bytes 20 in head, 68 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1881952
                                                                                                                  Entropy (8bit):7.999066394602922
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:49152:6Wp9u/ZAvKz7ZFCejPiSmYXKIr6kBwBUA:6W6Bn7ZFNiiKo2l
                                                                                                                  MD5:53C5F45B22E133B28D4BD3B5A350FDBD
                                                                                                                  SHA1:D180CFB1438D27F76E1919DA3E84F307CB83434F
                                                                                                                  SHA-256:8AF4C7CAC47D2B9C7ADEADF276EDAE830B4CC5FFE7E765E3C3D7B3FADCB5F273
                                                                                                                  SHA-512:46AD3DA58C63CA62FCFC4FAF9A7B5B320F4898A1E84EEF4DE16E0C0843BAFE078982FC9F78C5AC6511740B35382400B5F7AC3AE99BB52E32AD9639437DB481D1
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....x......D...............l............x..`?..........|...D..............M[. .content.inf...!........M[. .Damask.thmx...o.PI..[.............../.TU.jj0..3jCUPU.jF...m.UU.P}.....PU..*........w..#....E..].................A.. w.$..@..'g.......6%:..r9..d.M;M+.r.8[d{.s..dh..(P..........!.. ..ne..f.Nc..#..Y..q....KB}..b].@..F.&.t....E.........@&.m......$w......q...:.H....p.p.....?.9x.. .....?...ao....I....................o......g.u..;."....O;....{..(k..._.w/.Z......Jb..P.O?...........?....F....ty..72......! #....v..J......?.....!,.5.7..Em.....is.h.. \.H*)i1v..zwp.....P.....x].X{O//..\....Z>z....6...+..a.c...;.K..+...?014..p.w%o^.....]...MguF...`....r.S.......eF..):.dnk#.p{..<..{..Ym...>...H......x.}.hI..M....e......*G.&.?..~.~G6.....+...D..p...._...T....F6.[Cx./Q..Xe.>.;.}>.^..:..SB.X..2.......(A..&j9....\\.......Haf+]Y...$t^Y=........><.w....tL../E...%6.Vr~MI...l.....<.0.I....7.Q8y.f.uu...I.p..O..eYYS.O......9..Qo.......:..........o.............{
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 1750009 bytes, 2 files, at 0x44 +A "content.inf" +A "Slate.thmx", flags 0x4, ID 28969, number 1, extra bytes 20 in head, 72 datablocks, 0x1503 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1766185
                                                                                                                  Entropy (8bit):7.9991290831091115
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:24576:O/gjMj+RP9Q07h9F75a0BXjBccHMVk2Hq2SkGa0QglyZtxmdPP2LcSUtfgfp16Yx:kJ6RP9Q07/X5V7yVF0QgktxAPutUt0zP
                                                                                                                  MD5:828F96031F40BF8EBCB5E52AAEEB7E4C
                                                                                                                  SHA1:CACC32738A0A66C8FE51A81ED8E27A6F82E69EB2
                                                                                                                  SHA-256:640AD075B555D4A2143F909EAFD91F54076F5DDE42A2B11CD897BC564B5D7FF7
                                                                                                                  SHA-512:61F6355FF4D984931E79624394CCCA217054AE0F61B9AF1A1EDED5ACCA3D6FEF8940E338C313BE63FC766E6E7161CAFA0C8AE44AD4E0BE26C22FF17E2E6ABAF7
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D...............)q..............0?..........{...H..............M.. .content.inf.;.#........M.. .Slate.thmx.p.+..P..[......U..............p..K.!.......*...K..w..v........=....D$r...B....6 ...X.F0..d..m.s...$$r........m.)6.m3....vXn.l..o...a...V......Ru.:=2M.........T.....4S`EP......\..r,..v...G.P......'._H0]..%_............X.P.,.............H.?.-.H..".......M..&..o....R........<......`...D.H.._.G.Qv..(.*.U,.9..D...."..T..i.e../.e.."....,S...o.X.....c./..V....Z..o.O..2....{...+... ....0.@J.R.Q.m.....{.....h?u.q.O{...l.d)..Yk`.....#...u.-.m..#CXwrz4..7.>......v.E:.#.oGSKS.TX.Chm.4aQ......avH..{..j+@6[k].....`c..W8..j.v.Zh.]....4......K..#Hzyd..K}.....H|<H..\(l...+..%Z......~.S:^..d>..1..H%..7N-v.....Wu.*..b^.B.....k0gc.2.{.!...E7.}3.d...{.Ye...&#f6...:2......v..&!..k0d.p.b...,..$.....Y..60...h.N}.r...<[./........{...Es..&.nf.....2.@Fh3.9.G....l.[.C..SD/6.H.K....}..m....M..........gl.P.]..I......5....e.c...V....P...[.=.......O.eq+
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 26644 bytes, 2 files, at 0x4c "Element design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):42788
                                                                                                                  Entropy (8bit):7.89307894056
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:Hx+UzBiwDQTXgBm029ClGn4BZz6i5kIew/jG8Pi6lYJz1gH:0ZXc29eGn2n5klwjxP7l2z1gH
                                                                                                                  MD5:21A4B7B71631C2CCDA5FBBA63751F0D2
                                                                                                                  SHA1:DE65DC641D188062EF9385CC573B070AAA8BDD28
                                                                                                                  SHA-256:AE0C5A2C8377DBA613C576B1FF73F01AE8EF4A3A4A10B078B5752FB712B3776C
                                                                                                                  SHA-512:075A9E95C6EC7E358EA8942CF55EFB72AC797DEE1F1FFCD27AD60472ED38A76048D356638EF6EAC22106F94AFEE9D543B502D5E80B964471FA7419D288867D5D
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....h......L............................h...?..................@g......o...............Element design set.dotx.................Content.inf.Y/..Re..[......f........,..]....D.],....]..X.......XC4pE.....p........2..u;L.N.....]G..d.^d.$).e.=..;..Kb.../.../....H.."...w$._I..5.....a..4.Gd5p......v.8..1..%H..\..e...3.e..A..).d*.. . (.8.".......(>..<...@...~*v&.f..LWhqk]+Uep.d..%...o.....k.......e...nNN.&_.>.d.?H`"...r?..Z.p..q..<M.N.t....{*.y]#...._XW"qI...x.......}.. .N...;.}:..m8...[.r.F....^?...o...u..*...J3.V....~...~tn#.Kf6.s.|*..,s...M.$.f..?Yu.pE.1_wU...%....._..'..Z......y:.{.J5..7..Q.w}/.~.-3~Ctw=..IT.....mI.u@...y.M....2.%...y...Y..j.k<-.Q.r...7m..b...+.6..|.....U..}[...,....^....5..D..qW...[3).p.Y<.Hh..t...%cw=Z..W.~W.F....zr.4.g...O...P.g_^..3.-............3s...S..y...u...N...EsJz....tT../..c[w{cG....../6.....:.W<d5}.q..s..K"$........Ne..5..#.v'..n4.rj....Fc=....5..VN.....6..9`....|..........WX..-?..........W.)^`1.......].R2..s6...H.......
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 15691 bytes, 2 files, at 0x4c "gb.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31835
                                                                                                                  Entropy (8bit):7.81952379746457
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ltJDH8NmUekomvNufaqA8Pi6x5q3KQIGu:lvINukgzP7x5mRIGu
                                                                                                                  MD5:92A819D434A8AAEA2C65F0CC2F33BB3A
                                                                                                                  SHA1:85C3F1801EFFEA1EA10A8429B0875FC30893F2C8
                                                                                                                  SHA-256:5D13F9907AC381D19F0A7552FD6D9FC07C9BD42C0F9CE017FFF75587E1890375
                                                                                                                  SHA-512:01339E04130E08573DF7DBDFE25D82ED1D248B8D127BB90D536ECF4A26F5554E793E51E1A1800F61790738CC386121E443E942544246C60E47E25756F0C810A3
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....K=......L...........................K=...?..................q<......................gb.xsl.................Content.inf.EF/.....[...A....3D.4..oVP!i/......t.6..l&9r0.8......c..q.^........$/..(./H ...^_Z0\4.42WU......P.F..9.._....'.D..<H@..E.b,K..9o..wo..v|..[.{7m.......|}aI..|g....IF2au?.1,..3.H.......ed....-.........m....$..8&0..w........2....s....z..d.Z.e.....@$r[..r..4...."E.Q@...Hh.B"b>...$.L.$.P.._..~.?./T..@..F..?.~G...MS..O%Z3*k..:..._...!GF..U...!..W..$..7...j......xy0..../.j..~4......8...YV....Fe.LU..J.B.k%BT5.X.q.w.a4....5..r...W.6.u...]i...t.....e.\.K............#t.c5.6....j...?#..{.m3.L9...E/....B[R.k(.'....S.'.}!j.tL..v....L....{<.m4......d_kD..D.....4`aC....rg..S..F.b..^........g;.`?,......\..T.\.H.8W.!V...1.T1.....|.Uh....T..yD'..R.......,.`h..~.....=......4..6E..x#XcVlc_S54 ..Q.4!V..P...{w..z.*..u.v....DC...W.(>4..a..h.t.F.Z...C.....&..%v...kt....n..2....+.@...EW.GE..%.:R`,}v.%.nx.P.#.f.......:.5(...]...n3{...v........Q..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 27509 bytes, 2 files, at 0x4c "Equations.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):43653
                                                                                                                  Entropy (8bit):7.899157106666598
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:+bjfeR1OOZvv439PlDe5/QzhgFSo0UEDmJwkqTA8Pi63Bsgn66w:IM3CN9ZzhFbUUwaP73BsB6w
                                                                                                                  MD5:DA3380458170E60CBEA72602FDD0D955
                                                                                                                  SHA1:1D059F8CFD69F193D363DA337C87136885018F0F
                                                                                                                  SHA-256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
                                                                                                                  SHA-512:17080110000C66DF2282FF4B8FD332467AF8CEFFA312C617E958FDFEBEE8EEA9E316201E8ABC8B30797BB6124A5CC7F649119A9C496316434B5AB23D2FBD5BB8
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....uk......L...........................uk...?...................j......r...............Equations.dotx.................Content.inf.94v..R..[..... .............v........." Vw.w..r.....D.V5.p...W......b;....\x.....f.-...............l.....L.F..*..@..BnF.I.....%1..0....&.X.......X-.\.\.>..A....@..:...N .G./.Sp.A0.0.`.....q....b... ......S.{K...V....J............>\....\.E.#.,$.hxu.F.Fo....<...{..6../..#..l>d...w...&...S.....L.].....^..L......;~l.......qw.o. .....v.u.W`.4Z.A.....dC..Q)9.c..qgtfJ..G.(.J....q4V.).mK4;..zY..b.5&....V...0X.].Z..U.Lx..^..:8XQh.....7yy.._5............c.W...c...xY..%..G.$....kg^.1g.9.....z^.'...q."..K)a[.pW .LS.:Q8.....2..._q.os....y...d11.*.m....8.,.^.4_?i.e.u.,....._y.....zZZA.D.D<..+....{....Sfnv...t.....0...vV..y.r..3..%.<.t......;.h.wh.-.g.>..5...R...........y..]^..R..<...>$~.'...kk.n..H.EN.eQ.Q.O./='....)t.l0,/].....FNN......?...&..'.eS....K.K.v".^L..x=.^......1x|....=}@...B.kq;_a..C.q?..Y9.v......Q..u.G..V.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 15338 bytes, 2 files, at 0x4c "gosttitle.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31482
                                                                                                                  Entropy (8bit):7.808057272318224
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:LgHv7aLOcoLGQ4EykdrHwLa+A8Pi6Iv8ACIa:LwvWyx4EykdTwLaWP7I0ACIa
                                                                                                                  MD5:F10DF902980F1D5BEEA96B2C668408A7
                                                                                                                  SHA1:92D341581B9E24284B7C29E5623F8028DBBAAFE9
                                                                                                                  SHA-256:E0100320A4F63E07C77138A89EA24A1CBD69784A89FE3BF83E35576114B4CE02
                                                                                                                  SHA-512:00A8FBCD17D791289AC8F12DC3C404B0AFD240278492DF74D2C5F37609B11D91A26D737BE95D3FE01CDBC25EEDC6DA0C2D63A2CCC4AB208D6E054014083365FB
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....;......L............................;...?...................;......................gosttitle.xsl.$...............Content.inf....v....[...=..Ic.32.E...`o.............m....4uk[.,.......{...}k{.R@(Hq..68nv...@.D.....$...j....8Q..........8.8........3...*.bi?Wt...:(..J.;&eii..io.w..z...`.'..i.MLR@.>....N..3`P.>$X@(r.#.D..(....P"_..I.$o.. L!y...I...H.........{.{....{.3....7..w..{w.2sn.dYn.lW...l...c$.UH....L6. .D$$...!F.!... .D............_..'.`.Q.v>..Z..f.n.l....0o.......bK...?s..eO....'.>t......S'..........~....h...v&7:q.x9|qs...%....:..D...ag.....e..'...".A.Y..?w"....p1t.9J.~.4.........~vj.n.8.;.O......../.}..io{p...e...\m.d`.gAm.......1"...N*...8..g"......~..[.e+.....\6i4.....%...Rq.U-p?..4P..4.f.?N.vI?.M\i.;.s..E.L.hu.*...\..5....N......]......\`...rS.\g.....2..!a).?.l.!i.^.t.u...x...g/.A..v.E...\.@.>kM...&.g.....%.......{.....2..E.g...'..[w...N.w..& 4M.a.cu.%:...\.D..Q..C.'fm..i....@._......QI.. ....h..|fB.il.(`..h.d;.l...`.s:
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 18672 bytes, 2 files, at 0x4c "APASixthEditionOfficeOnline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):34816
                                                                                                                  Entropy (8bit):7.840826397575377
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:i3R9VYnIYfPYmqX0CnF1SRHVnLG8Pi61YbEIFO:ih9VjYfPYlk+F1SJxP71YbEIFO
                                                                                                                  MD5:62863124CDCDA135ECC0E722782CB888
                                                                                                                  SHA1:2543B8A9D3B2304BB73D2ADBEC60DB040B732055
                                                                                                                  SHA-256:23CCFB7206A8F77A13080998EC6EF95B59B3C3E12B72B2D2AD4E53B0B26BB8C3
                                                                                                                  SHA-512:2734D1119DC14B7DFB417F217867EF8CE8E73D69C332587278C0896B91247A40C289426A1A53F1796CCB42190001273D35525FCEA8BA2932A69A581972A1EF00
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....H......L............................H...?...................G......................APASixthEditionOfficeOnline.xsl.H...............Content.inf..h;.....[...Q..\..3S.5..oVP!i/Z.Ls...]q$...xY..+W.qm..B..y/.5.s..x$../K./.x.$.....}.......\........LNf..Hd.&."Ip.L.Mr-@.D..kW~i...^.....F.....T.U....../..0..2.{.q.T.`'{.00.{.B...>.R..2....1.~_.f..s...........~....~[..v..w..v....$[K.r$#[6...d;[...#.9.-...G..Z..eAR.0")%JI?&....$..$.H..$(........f.> k....hP...p...!j.T......l7..../3..(2^V...#..T9...3.@[0...le:...........E....YP.\.....au1...\.S|..-.duN.Z..g.O......X8....1.....|,.f/..w.|Wk]zJz.g'./7h..+.....}............x....s.2Z\..W.{...O....W.{j.U..Q....uO=.p.M k.E.S{SUd.@....S.Syo8>......r......8..............Z?>.mUAg....?o....f.7..W.n...P..........d.S?...\..W`...c.ua..........#.Y...45...F(d.o\09^..[.}...BsT.SD..[l.8..uw.7l..S.9T.KR..o......V..]...M .....t.r...:P...M....4.F.....@..t.1t..S...k.2.|5...i.%H..<.J..*.0n.....lZ.....?.*?.~..O .)..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 5213 bytes, 2 files, at 0x44 "rings.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21357
                                                                                                                  Entropy (8bit):7.641082043198371
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:zdx+NRrogu6fzCI7Th7G8E0GftpBjEzZq4FLrHRN7/Oll7PK/pB:/+NRrFf/G8Pi6zZb/GIB
                                                                                                                  MD5:97F5B7B7E9E1281999468A5C42CB12E7
                                                                                                                  SHA1:99481B2FA609D1D80A9016ADAA3D37E7707A2ED1
                                                                                                                  SHA-256:1CF5C2D0F6188FFFF117932C424CC55D1459E0852564C09D7779263ABD116118
                                                                                                                  SHA-512:ACE9718D724B51FE04B900CE1D2075C0C05C80243EA68D4731A63138F3A1287776E80BD67ECB14C323C69AA1796E9D8774A3611FE835BA3CA891270DE1E7FD1F
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....].......D...........................]....?..........{.......................rings.glox.................Content.inf..|^.....[......P........<.$.."..0R..xa.Ax#B..d... ....K,.....^.H.....H.........&.j.\f.. ..,....,..!k..R..e..!...E...........................><.RB.....~h...........Q................g..M|,...x.....qV7.u..\...F-N.{-..X..&Zig.~..{.A.p.Z...X..{,-n............`$.%.ND.....>].6cvZ.%d..*a.$..-.K.Hf....L..;.#...H....U,........P.@.*-$C.,.g...%YJE..$.jP........b...Y<..[U...MF]F.K...1... x.}3w.o.#,.}T.....w5+...=.=...c.F^....OM.=.......G_{n.*...WC.w!......{/.~.}..s..6_......)..Xy...4.....<..XZJ........#~._i....%..fM.V.?.q...q.....7...B..sVt...(.:..c....~.e...kGZ...C..(J..o...`...?.)-.T.l....&...gR.$.....g.:...2.e%F.....x....z0...K..a8B...........D..]....7....~.".DR...r)...}b)e.>.\h~f...(}.c........Q...o5H.........C.KC.(.L.l................R..a.pg{..\.......-b........}.C......qTS..%..r.lG..Q.1..Z.>a.D...tC..LV...Rs.C.M18x.:......%O.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 4410 bytes, 2 files, at 0x44 "PictureFrame.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20554
                                                                                                                  Entropy (8bit):7.612044504501488
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:zEAH676iPi8+IS5iqn7G8E0GftpBjExDxIHFLrHRN7Ke/ll7PK/pGaz6:zEhG8+ISrG8Pi6xDxCKoIGaz6
                                                                                                                  MD5:486CBCB223B873132FFAF4B8AD0AD044
                                                                                                                  SHA1:B0EC82CD986C2AB5A51C577644DE32CFE9B12F92
                                                                                                                  SHA-256:B217393FD2F95A11E2C594E736067870212E3C5242A212D6F9539450E8684616
                                                                                                                  SHA-512:69A48BF2B1DB64348C63FC0A50B4807FB9F0175215E306E60252FFFD792B1300128E8E847A81A0E24757B5F999875DA9E662C0F0D178071DB4F9E78239109060
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....:.......D...........................:....?..................................PictureFrame.glox.................Content.inf........[.... '.q..@.........<./..+./. ...."o.o./..{^a.7^.D.HA....^J... ...........T%q..b...+pz.n.=....jT.+M..=H..A...py.3.........H...N...[..%..~....>.%....3.r...wx.....0.....7..94..2..45..7f.......D.. ...[...f.:H..../N..4.....8.....:x.I....u|.`."...\..N..%.M#..^v$.*....T.m.....?.-.wki.X..8..F.G..Y.^8...-....+.&.+&.No...e!.#.8.....YF.......<w.....=.Q.S..7....MW....M..9A.3..c..L....|.E-Y....]n".|....b9..l@.d.T...a.f...~.&k.[..yS..q..]L}..)w.....$.@..v...[9..X....V...a.NK....m9.5.....Kq.;9`.U.e...8.<..)Y.H........z.G...3n.yWa.g.>.w!e.B8:......f..h..z....o.1<.RT..WK...?g .N..+..p.B.|...1pR_......@...a....aA......ye..8...+M.l..(.d..f.;....g........8R.\.w.:ba....%...|p....`lrA.|....a.U.m=ld......7....#..?Dq..D.....(.5.K.a..c.G..7..]hF..%:}......}J.j$.....4...l];..v>.&j........Y.vk..$1.@X$...k...9..?...z..![..../...).a.=....aZ^.3?....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 4313 bytes, 2 files, at 0x44 "chevronaccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20457
                                                                                                                  Entropy (8bit):7.612540359660869
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:KyeISBuydn5rpmp77G8E0GftpBjE/kFLrHRN7ngslI66YVj:KHISBvd5rpmFG8Pi6/6nK666j
                                                                                                                  MD5:4EFA48EC307EAF2F9B346A073C67FCFB
                                                                                                                  SHA1:76A7E1234FF29A2B18C968F89082A14C9C851A43
                                                                                                                  SHA-256:3EE9AE1F8DAB4C498BD561D8FCC66D83E58F11B7BB4B2776DF99F4CDA4B850C2
                                                                                                                  SHA-512:2705644D501D85A821E96732776F61641FE82820FD6A39FFAF54A45AD126C886DC36C1398CDBDBB5FE282D9B09D27F9BFE7F26A646F926DA55DFF28E61FBD696
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................................chevronaccent.glox.................Content.inf..O.$N...[.........B.....?.....$Zy..Zkr...y<.....Di-.aVX/....h..-.~........#.../.Fz....T...p....A..eHMe[..p...=................f..../%o......F@..=..$.B!....}.0..g..^vlI......f.W.F...Nm..2`...)...,.HL4.nsl.F.ir.k..e.!^.j2.v.iT....t...*..!h..Y...2Q..-.x.,.Xj.U.cj,....9.....)..W..n3f.......(cH.D.4M.!.+..4..3r..y......|r..@.PD.R..#...F..nJAR..1{-.....u3..$..L.b+h....:lZ.>....q.?. ~l..^.%.m....a...cG.h.?.|.?7.'....b.G.4..'..A...o.Z...//..?...d..*.....C..Z.....]Yv.g.]..... .........]x.#=.../.7;R.j....G.....zq=O`[.'5g.D.u..)..../../.v.JmCW.da....3.f..C.z%...S=....;A.q.|....z.E.aRu........ k..J"+.f.S.@.........eD4....\0..t./U..%.H..........M:..U.......J...Z..H.DG..u^..D..P....`.^b.........`c......#.....c.?...#..C.V.&.'..f.'...f.[..F.O..a...&..{TiXg4; .X."..0...B.#..^..........N"..w.@f...gd.S..K.....E....ZR...;.twR>.z.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 4091 bytes, 2 files, at 0x44 "BracketList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20235
                                                                                                                  Entropy (8bit):7.61176626859621
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:j3W3yGyjgbA8E0GftpBjEHvFLrHRN7pDAlI66Yv1:j3WFyAA8Pi6HVpDZ66c1
                                                                                                                  MD5:E3C64173B2F4AA7AB72E1396A9514BD8
                                                                                                                  SHA1:774E52F7E74B90E6A520359840B0CA54B3085D88
                                                                                                                  SHA-256:16C08547239E5B969041AB201EB55A3E30EAD400433E926257331CB945DFF094
                                                                                                                  SHA-512:7ED618578C6517ED967FB3521FD4DBED9CDFB7F7982B2B8437804786833207D246E4FCD7B85A669C305BE3B823832D2628105F01E2CF30B494172A17FC48576D
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................................BracketList.glox.................Content.inf....7r...[.... G.q..@...B.....?X!.A.......!........X..Vk.JK...Z..=......PD.....P....5...jp..+..T....b.)np5.7.....Zz........... ..!.....S......1....`....h......T?.Nq../......z....[..:..5f;....O...d.FxD...4...Z....[..a...w..W.[..P...5.]...6..."...+t].!...2\%%`Q.\..)...=>.)......a.$.2.,...2,.Lw.?..+..qf....h....T/B.....}T.E...'.%.....,.......X....b..gt.hPYc|.....a...j...=...{..a.`!8!..|...L.T..k..!,.R.z/W....{..,...+..w.m..sQ..7<x..B....?....\.)..l...d...}.....v..W.C..'=p1c.Z=.W.g.e....&wm..N,..K.T../.oV../=9.}.....".28...r.Q....dzj{....S...1m...x9_...2PXpa...Q.n.$z...c..SGq...k......}kPE..*...3.|.5A.>..6.......+)qCB....q....qNkGe...W]..o..Z...J.<.i......qq.8....q..BE.(...._h.U.\@3.F...KdO..=1j+....).*Q.|B..Z..%......LDYk....j.....{klDW..#CVy}...X..O!..}..s..&..DC.....tL.j..b.......[...n.'..1..Xc...9Q..gM.....n..3...v.....~.).
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 14939 bytes, 2 files, at 0x44 "CircleProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31083
                                                                                                                  Entropy (8bit):7.814202819173796
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:0XbSq3W46TVZb5fOFo1HtZwGqtRT44hS+nyBoiuFgbA8E0GftpBjEcBFLrHRN7Ku:0XpOflfOFo1DMr/iuuA8Pi6cfKjW66b
                                                                                                                  MD5:89A9818E6658D73A73B642522FF8701F
                                                                                                                  SHA1:E66C95E957B74E90B444FF16D9B270ADAB12E0F4
                                                                                                                  SHA-256:F747DD8B79FC69217FA3E36FAE0AB417C1A0759C28C2C4F8B7450C70171228E6
                                                                                                                  SHA-512:321782B0B633380DA69BD7E98AA05BE7FA5D19A131294CC7C0A598A6A1A1AEF97AB1068427E4223AA30976E3C8246FF5C3C1265D4768FE9909B37F38CBC9E60D
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....[:......D...........................[:...?...................A..............CircleProcess.glox......A..........Content.inf......9.B[.....@*........!...(A.D..K.W.wwpwJj\.K\w...]...K.!.....@0..?,...}won`... ....&I..(;.....X.u..^.R..^......_:....W>f\....T...B..i`|q.....................i.5....(........0q7@.@..F...?A.`.....,L.......5.+../56..a`....1C5..9.*I.N.......@|<+./......... .ya....>l.,t.......y.y5...FF.,F..jCA...SA..H....8u.L..eM?.w8.......~^.Mr.[...(.._......u..+.......j..TJ.:<.3.X`...U.bz...[...r-...[...+..B.......}...\'.i...C.8.B_...c.8</..s.....VQ.Y..m.,.j~;y ...2.5.VQ...K..jP..2..r-...HA...."..9).7.....5.E._.wq.......!.+n+.f...s].4M'.1&...5....4..k..NV.M1.7`a..<.P4.|.mrd.i.R...u...............v.}..n\.C$.....[..2c.^..W..g..._.0.C.o....%.z.!.;.@y.`\..UO#i.)...Q...........L. .\:_..H.{.W...@...T.4..A.a...Wo?o$4.....#.V.s8M.Gh..p?A...Y.....)...........r|...!..o9...8..%#.[....;...3<Z...g....~.Z....,.(...qA.'x#..xC..@...HOuW.[.[....c.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 15327 bytes, 2 files, at 0x4c "sist02.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31471
                                                                                                                  Entropy (8bit):7.818389271364328
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:eNtFWk68dbr2QxbM971RqpzAA8Pi6TlHaGRA5yr:eNtEkpGSbuHAkP7TlHaGq54
                                                                                                                  MD5:91AADBEC4171CFA8292B618492F5EF34
                                                                                                                  SHA1:A47DEB62A21056376DD8F862E1300F1E7DC69D1D
                                                                                                                  SHA-256:7E1A90CDB2BA7F03ABCB4687F0931858BF57E13552E0E4E54EC69A27325011EA
                                                                                                                  SHA-512:1978280C699F7F739CD9F6A81F2B665643BD0BE42CE815D22528F0D57C5A646FC30AAE517D4A0A374EFB8BD3C53EB9B3D129660503A82BA065679BBBB39BD8D5
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....;......L............................;...?...................;......g...............sist02.xsl.................Content.inf....!....[...=.rF..3U.5...g.i?..w.oY..If'.......Y.;.B.....Wo.{T.TA.~......8......u.p....@Q..k.?.....G....j.|*.*J69H.2.ee..23s..;3..i..L.,...0se.%J........%.....!.....qB...SC...GAu5.P..u7....:.|.$Fo............{.......v.v.g..{o....e.....m.JeRG..,.%.1..Lh.@8.i.....l.#.HB`B....C......D@....?....P?..................|.9..q.......9.n.....F...s,....3..Q..N......y......_i..9|.<w...'q.Tq...U.E.B...q.?.4..O(_O.A.......*jC.~.21.7.....u.C...]uc.....-.g.{C~9q.q.1.1...4..=.0.Z.^....'../....-.6.K.....K...A#.GR..t.@.{.O.......Q5..=....X...^...F3.e.E.Z..b+R..?Z..0T1.....gQz.&....%y=zx.f.....6-*...u.Rm..x<...?...!g@.}..).J...:*...9.s&.v..}..'...\..Sd..F...........kQr.....h..3..1....B...B{M...%O.59.\.#....s/.pE.:}...k_.P.>.zj....5|.9+....$M..L........(...@#.....N.....N.*..........E..7..R$.:9!r>7.....v...>..S.w....9..]..n.w.;&.W..<r\S....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x4c "chicago.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 10 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):33610
                                                                                                                  Entropy (8bit):7.8340762758330476
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:IlFYcxiahedKSDNAPk5WEEfA8Pi6xnOKMRA58:2JitdKsNAM5WBDP7xOKMq58
                                                                                                                  MD5:51804E255C573176039F4D5B55C12AB2
                                                                                                                  SHA1:A4822E5072B858A7CCA7DE948CAA7D2268F1BB4B
                                                                                                                  SHA-256:3C6F66790C543D4E9D8E0E6F476B1ACADF0A5FCDD561B8484D8DDDADFDF8134B
                                                                                                                  SHA-512:2AC8B1E433C9283377B725A03AE72374663FEC81ABBA4C049B80409819BB9613E135FCD640ED433701795BDF4D5822461D76A06859C4084E7BAE216D771BB091
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....:D......L...........................:D...?..................XC.....................chicago.xsl. ...............Content.inf.!..B...[...H."m..3C.6...WP!i/Z..vn._...^omvw+...^..L.4o...g..y......^..x...BH.B.K....w.....F........p ./gg.h.0I',.$..a.`.*...^..vi..mw..........K....oQ............P...#...3.......U(.=...q.~?..H..?.'I4'.......X...}w.vw.....f.n..f{3.....-....%dK&q..D.H.Z..h-..H.[$ %.."..e....1...$.............'.....B..%..4...&`S!DQ...M.......N~............S..'....M..4E.^..dej..i..+.`...6F%sJ....Q..d.(*.s.Z...U-5Eh.s.CK...K..X$......j..T.?.`.|...=..R...-7...*...TU.....7a...&I.noOK|.W.R-+S.d..rR.....{h.Y...)..xJ..=.XM..o...P'.I4m..~I..C..m.....f.....;{Mzg+Wm.~...z...r-.....eK...lj:^.1g5...7.h(T"..t?5......u.....G.Z<..sL.\{...8=t...Z...'tps.:...|....6.....S..X...I...6l.M.....aq.;YS....{:.&.'.&.F.l...\.[L.%.so\.v.Lo...zO.^^...p..*9k...).CC..F0>L...VUE4.......2..c..p.rCi..#...b.C@o.l.. E_b..{d...hX.\_!a#.E.....yS.H...aZ...~D3.pj: ss?.]....~
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 16689 bytes, 2 files, at 0x4c "iso690.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32833
                                                                                                                  Entropy (8bit):7.825460303519308
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:+0TU06CkaUYMoi//YX428RaFA8Pi6e9iA4I3w:vICTm/QorUpP7eAA4I3w
                                                                                                                  MD5:205AF51604EF96EF1E8E60212541F742
                                                                                                                  SHA1:D436FE689F8EF51FBA898454CF509DDB049C1545
                                                                                                                  SHA-256:DF3FFF163924D08517B41455F2D06788BA4E49C68337D15ECF329BE48CF7DA2D
                                                                                                                  SHA-512:BCBA80ED0E36F7ABC1AEF19E6FF6EB654B9E91268E79CA8F421CB8ADD6C2B0268AD6C45E6CC06652F59235084ECDA3BA2851A38E6BCD1A0387EB3420C6EC94AC
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....1A......L...........................1A...?..................S@......v...............iso690.xsl.................Content.inf.B.9.....[...A.c...32.E...P..'.^}.f...ikMJ....m..s..U.w{m{{...}n.4........I. ..9..d..I.......P|....F...F.......&&J.:I.34......+*M3..4mr.........m.r..m)....dK.wiw...H,...r........y.$..Cu...L...dH.../..V......g.PG$R39...4O..............{w..^....c.m.m.o.....#..Fgs..6.....b....3.I..O....B..B..1h"....K|f .41......_..g.N.<.>........(....o3a.M)....J..}....-......8.......g.hm!r<...-..1.1....q.?....S.m...`L.g#.K.igv.].ghD....L...p5..?.......iP.[JS.J..?z~.T/.Q...E.K.......P+\LW.-.c..[9.n.7.....P...*[.A1....m...4h.9...N[....h5 n%k.~RR.*c..n..=...4....).eH.-./..>....*.r..S.*..dE.........pF..s.A..?...f..u.+.{..?>N.4].}Xb.M......y......'.2..'..........J4{r..r.3........5>..a0.>.u_.y@g....+y.yu--,ZdD.........5]3..'.s...|.....K.....T..G.G.e...)..\x..OM.g...`..j0......BfH...+.....:......l`.qU...;.@...",.."........>;P.B.^F...3!......Rx.9..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 3144 bytes, 2 files, at 0x44 "VaryingWidthList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):19288
                                                                                                                  Entropy (8bit):7.570850633867256
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:5ZII4Hf+7G8E0GftpBjCwBFLrHRN7bcClvQyUTL2mH:pG8PicgbcAvU+mH
                                                                                                                  MD5:B9A6FF715719EE9DE16421AB983CA745
                                                                                                                  SHA1:6B3F68B224020CD4BF142D7EDAAEC6B471870358
                                                                                                                  SHA-256:E3BE3F1E341C0FA5E9CB79E2739CF0565C6EA6C189EA3E53ACF04320459A7070
                                                                                                                  SHA-512:062A765AC4602DB64D0504B79BE7380C14C143091A09F98A5E03E18747B2166BD862CE7EF55403D27B54CEB397D95BFAE3195C15D5516786FEBDAC6CD5FBF9CD
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....H.......D...........................H....?..................................VaryingWidthList.glox.................Content.inf...O.....[.... v.q......R.....>.%i.I.HhD.V...qt.....'....N...!..aw$(J.%(..A..h......l|.D.p9`..Y09.:.u....p. :,.*.YD=0.p. ......w.........*..<..;.....u.."......7[....8.....?^........-..;q.|.....B....PJ....r.K#.#.0'...}.........+gpR...T....5.iu.^I...A\..gK....}..z.B.nT.../.m.......N....E'1.E.\..o.....W..R.#.#...8.7...R.SbW-...%......$.obj.F..W_@....sY!........s.O..."k. ..b....j....v...P.\....7d...|"J.T...2p..m.&..r..,2.).....X.`...xt].U...b.h..V.....|L..N.Z.O#....o...1R.w30.g..?;..C.T.:$..MGY.C"i\.f..#..<.k...m..s.w. ..Ga].....wt.h|.Ta<.......(SO.]9.%a..Z... r._JH.=O...P.9a.v.....Kj.".T...m...4.?...F...$...y.....hbW.UA..u.&)....py.C{.=t.....n...}|H3A9.=..W..JJ..y./Y.E.M9..Z..w. .HB.YoIi..i.e..9;n...SpHw,....f....d>..g.m..z...... ...f...KP.M..U.....~vFD.fQ.P?......2!.n.....`@C!G...XI.].s,.X.'...u.E.o..f
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 12767 bytes, 2 files, at 0x4c "ieee2006officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):28911
                                                                                                                  Entropy (8bit):7.7784119983764715
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:WnJY165YD0tPYoCKa3HueqRyzVscLk1Yj2GjcgbA8E0GftpBjE2kWTpjFLrHRN7N:X4rtPzCK6uRoljXBA8Pi62ZphL0HRA5p
                                                                                                                  MD5:6D787B1E223DB6B91B69238062CCA872
                                                                                                                  SHA1:A02F3D847D1F8973E854B89D4558413EA2E349F7
                                                                                                                  SHA-256:DA2F261C3C82E229A097A9302C8580F014BB6442825DB47C008DA097CFCE0EE4
                                                                                                                  SHA-512:9856D88D5C63CD6EBCF26E5D7521F194FA6B6E7BF55DD2E0238457A1B760EB8FB0D573A6E85E819BF8E5BE596537E99BC8C2DCE7EC6E2809A43490CACCD44169
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....1......L............................1...?...................0......"}..............ieee2006officeonline.xsl.:...............Content.inf.........[...G."...3$pE...G B....m3o[...I2&.f.,\..........}.n..{..e.8!^.3.A@...x..... .D.52gU..]..."..N8....s..CS..J3..HV...m...y..o....F.z......V.j._....=~k.....'.dY........1........#...d13.g.&C...C.xw.`f.hf..........]M....m.m....ud...,+.H~..cL...e#;(RI...eA....I.b...E...2..(...$.j...L...$..A....'[...H9..&..G.Q....".M.yl....]..?j%+....O~.*....|.se...K\.B"W..F.5.......=s...l.Y...K..yN.TBH[...sTWR.N.d...WEa....T.d.K.^sauI......m..s=.,qso5.b.V.s.]..9..,k4.\..L.;D...........;r.C...7.w.j..:N8.V6..a.3..j:A.mA..To..$.5....:./..p.x.3.=..__...8.EB.K.*..].-."..5-XU..J.....=o..K.Wavg.o].z.9.gk.._.........MZ.<.5............OY.n.o...r.9v.c.......[n.[..D...d..}.j.....LB,]_.9..St.@..C....\...^....-&.njq..!P....G^.....w.7.p~.......M..g.J............t1......q.w.rx...qp.....E.........-...2..G.........z.]B........d....C.@...@.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 14864 bytes, 2 files, at 0x4c "mlaseventheditionofficeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31008
                                                                                                                  Entropy (8bit):7.806058951525675
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ktH7oN/HbwiV+M+4Jc+5UrT3czi5uOHQA8Pi6DxUR/WTZIy:87sPEANXJc+eTMsuzP7DmN0ZIy
                                                                                                                  MD5:E033CCBC7BA787A2F824CE0952E57D44
                                                                                                                  SHA1:EEEA573BEA217878CD9E47D7EA94E56BDAFFE22A
                                                                                                                  SHA-256:D250EB1F93B43EFB7654B831B4183C9CAEC2D12D4EFEE8607FEE70B9FAB20730
                                                                                                                  SHA-512:B807B024B32E7F975AED408B77563A6B47865EECE32E8BA993502D9874B56580ECC9D9A3FEFA057FDD36FB8D519B6E184DB0593A65CC0ACF5E4ACCBEDE0F9417
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....:......L............................:...?...................9......................mlaseventheditionofficeonline.xsl.L...............Content.inf.N.#.....[...>..9..3c.5...F.B.]Y.3..%d.8...v;....~Y.L.=..v..m.g...|K.B....$......s.......#CdE.p.p..@...j.Nl2'...L..N.G:-V:.d.....i..M........mK.w.....\W.<.`..b$.!..!3..rT.A..#.).;KZ...a.-..j&e`R.~7dIRS.I..f.ff....}.}....^[wo.uw..i.m7......v$.I..n....-.Z.M5...iH..Ea..., [..0.L...DH..." ..... .@...H.@..+...}.......*^..'.4*.tHa..f].gV..~.7V.....C..).(.U"..f.@l..j'..%\.u.UU.....9<13...5..=........./..Z..{..-.L].+Y.fL.<EJ.q..!.j....W..]E./.~Y>...GgQ..-....Q.C..5..T+...fO. .)..~.7..Y....+..U=.e..8w.m...._..S..v.d.* ......S3z.X)......u...t.......i.;.a...X.Ji....g.3.!.O.....T.f6..[U....O..Z.X.q.G....?.k]..?...8.u.;].8y.T.9D..!?R....:........3+.P.....7?m}..............1...y3.g.\c.ks^;?.f.U5...U.j....E.N.}.!.......).R1....~.....R.....3.J.f...l..E^:...&_..%..v...^..E...rC..O....M.#..<..H..bB.+.W..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 14813 bytes, 2 files, at 0x4c "iso690nmerical.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 7 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):30957
                                                                                                                  Entropy (8bit):7.808231503692675
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:rKfgT03jNkAFbgUQWtxq9OGh1bBkd/1MVHb5iVOdMgbA8E0GftpBjEl8tFLrHRNF:r303jOrUQAkfhopWHbA8Pi6l8zuUIq
                                                                                                                  MD5:D3C9036E4E1159E832B1B4D2E9D42BF0
                                                                                                                  SHA1:966E04B7A8016D7FDAFE2C611957F6E946FAB1B9
                                                                                                                  SHA-256:434576EB1A16C2D14D666A33EDDE76717C896D79F45DF56742AFD90ACB9F21CE
                                                                                                                  SHA-512:D28D7F467F072985BCFCC6449AD16D528D531EB81912D4C3D956CF8936F96D474B18E7992B16D6834E9D2782470D193A17598CAB55A7F9EB0824BC3F069216B6
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....9......L............................9...?...................8......1P..............iso690nmerical.xsl.................Content.inf...A@...[...5.....33.E...P.../..........5sv.]3srm8.T.=.......}.v.T.. ..4IH.r.%Z.(.q.\+K..[,....E....A......#CEF..}p..Y/s$...YKI.#M.?.t.1#C....I..v.vn...-...v7../S.m.Ma.....!.Y....4.......3.3....c&R9..%......(J..BDMI.>7J.....".....}.w.}w.wg.v...^.n.{....{f.mlI..%.#..I..S....D..QJ U......4........K.(@....DH.....}...8;..z...&0%e..G.OAM..x.3......\....zS9....}......89.B...e.W.p{;.....m.m3...}....../...q.~..;.,..".j.g..^N............iC.../|...g.=..9.Q].Gf.....QA....74..v.....9.n[......0.}..jo{y./.2..Ym......;u...b.(Jz^.....~..uM...{s../..#.)n2..S.S.c..6)U.V....!.'R.......P.S.D..S.p/......D.......{......?.u.",...Mp._....N..+..=Y#..&0w....r.......$.xwC......P.e7.>O....7....].y%q^S'....*.C.`.?..}Q..k../u.TK...y........S...{T.?......[.H.'L..AS.Y.|*..b...J.H-.^U>'9..uD[.".b[.l.......o..6.L).h.B0RJa.b..|m:.):......F
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 15418 bytes, 2 files, at 0x4c "harvardanglia2008officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):31562
                                                                                                                  Entropy (8bit):7.81640835713744
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:yhsBScEWkrljntbzuMmWh7ezPnGgbA8E0GftpBjohgsRFLrHRN7ybll7PK/p:MsBScwtnBmWNeTzA8PiuWsvyDI
                                                                                                                  MD5:1D6F8E73A0662A48D332090A4C8C898F
                                                                                                                  SHA1:CF9AD4F157772F5EDC0FDDEEFD9B05958B67549C
                                                                                                                  SHA-256:8077C92C66D15D7E03FBFF3A48BD9576B80F698A36A44316EABA81EE8043B673
                                                                                                                  SHA-512:5C03A99ECD747FBC7A15F082DF08C0D26383DB781E1F70771D4970E354A962294CE11BE53BECAAD6746AB127C5B194A93B7E1B139C12E6E45423B3A509D771FC
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....:<......L...........................:<...?..................D;.......V..............harvardanglia2008officeonline.xsl.L...............Content.inf.Vu......[...E..o..3D.5..nF.A..+.e.....6r..f........M3...-.s.m.... $r.b.!.q!.....G...0.\.......fd......%m...'1Y..f..O...*.#.P.,{..m...|..ww.{.m...f...n%...,..y...0y...8.Q...`.../.q....a...',.V......8.7..8t..................6.]..6..nw..ynm..-l.Y..,.I?..$....+b9$E!S@"..) .4........H...lA...@!a.F.l$..0#!.....n&.5j.t+..1f|.+....E.zDk.l8.+<q.^.........\5.l..iT.9...........Y..6.^,.o.bn.E*5w..s.../...W.gS..j9..'W.F......].4\Mzz..Td..Ho..~.Q...Z..D..O.JP..m..s.j.:..........y._.....#.*.rD....60.\!y........p.o3,..Ub,......[[L.{.5.....5.7UDB9.{;;g.z.z..jM.G.MY.oe.....(r..B6..CV.7Fl.Z/....-.O.vY.c...-..........b.T)3.u..f~x2.?.8.g.x.-.....Qt_...$e.l..jtP..b....h..*.sW0.`.....c...F_....t.........LC..*5I.X$^.;&....#.._\J..........;..wP..wX.qy.qs...}46..fK.XN.&0........k1....8...............'t.......}.......O_.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 7453 bytes, 2 files, at 0x44 "pictureorgchart.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):23597
                                                                                                                  Entropy (8bit):7.692965575678876
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:y6aR//q0bJi/Uj+957G8E0GftpBj/4YOFLrHRN7LxhKll7PK/ph:y6I/Li/UjmVG8PiZ4YsLxh6Ih
                                                                                                                  MD5:7C645EC505982FE529D0E5035B378FFC
                                                                                                                  SHA1:1488ED81B350938D68A47C7F0BCE8D91FB1673E2
                                                                                                                  SHA-256:298FD9DADF0ACEBB2AA058A09EEBFAE15E5D1C5A8982DEE6669C63FB6119A13D
                                                                                                                  SHA-512:9F410DA5DB24B0B72E7774B4CF4398EDF0D361B9A79FBE2736A1DDD770AFE280877F5B430E0D26147CCA0524A54EA8B41F88B771F3598C2744A7803237B314B2
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF............D................................?..................................pictureorgchart.glox.................Content.inf.W..y....[.............../.jC....U.CUUUTU.5...jjPU..MP....T..0*....o0.......Y.=....P.({.3.p..."pA!>r../3.q..7...........!...TO....(..%......6...3E?....~......CZmndse.Qy....p....h....=.:5...F..%.E.&.v.`I~. ..%._..b]..Y..Q..R.........nN.q8c..a..L..X/.M...PP.q..SpZ.K]>D"Pf..B.c....0..|I.Q.,.g/..Kev.../..=......w..}3.....(....+#T.....K`N.u..Z.....rriK.(...(...6.<R.%.]..NX..b..].C.u....++......Ia.x. .7....J.#............w>....7..R...H>....@%....~.yA.......~.UB..*. .P..$...-...v.....=M."....hw..b....{.....2pR....].C..u@=G."Y..;..gc/N.N.YB.Z.q.#....$....j.D.*.P..!.)S.{..c....&'E.lJ%.|O.a...FG.|.....A..h.=c7.)d.5...D...L...IQ..TTE.*NL-.*M..>..p0.`......m..,.w#rZ..wR\@.Wn..@Q...}..&...E...0K.NY....M.71..`.M./:.>..._L..m...,U.l....._fi...nj9..,..w.s.kJ.m.s.M.vmw.!.....B.s.%.-').h.....)c.l....F..`3r...-.....0..7..&N.....n.#H...<7
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 5731 bytes, 2 files, at 0x44 "ThemePictureAlternatingAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):21875
                                                                                                                  Entropy (8bit):7.6559132103953305
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:k73HRpZA6B3ulrnxtRT7G8E0GftpBjEdHqlFLrHRN7uhFlvQyUTL2m4c:k7XRgIkrG8Pi6dmuNvU+mp
                                                                                                                  MD5:E532038762503FFA1371DF03FA2E222D
                                                                                                                  SHA1:F343B559AE21DAEF06CBCD8B2B3695DE1B1A46F0
                                                                                                                  SHA-256:5C70DD1551EB8B9B13EFAFEEAF70F08B307E110CAEE75AD9908A6A42BBCCB07E
                                                                                                                  SHA-512:E0712B481F1991256A01C3D02ED56645F61AA46EB5DE47E5D64D5ECD20052CDA0EE7D38208B5EE982971CCA59F2717B7CAE4DFCF235B779215E7613AA5DCD976
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....c.......D...........................c....?..................................ThemePictureAlternatingAccent.glox.................Content.inf...3.....[.... .qq...........\<.^......o."......f.o...x.{..q..^.MH^...........{0.K....4pX.i...@6A4X.P.01d....'p.......zA.......... .......7.......a. `.=!@- ......>G.s.k~@.a.lfha:m....1...@.,G`....{....W..N..qs.......j.+TrsT.l.9..L...1+...d..-u..-.......).#u&...3......k.&C...DdZ.'.......8..<PF..r.eq.X6...u..v...s5.m.Q.l.G%.<.]....RV<...S..Dv..s.r.......dh.N.3-.Hf'.....3.GZ..E.kt.5......h...|...?!.L....~.)..v....:2.../F.,....o.qi.i7..E.|.mh.R_.@A.FO@i.....Feo...x.l...{E.\W9|V...=#..3..(......tP.:i....Ox.U.N...%6...p.6&.....<zh.z.|.<Z.?.k....y7m...F.Z$-.:.l.h...{T..7....?..T...d,r...z?../...`/Z......a.v@)....u......V..v.:.._.|.'..[..O.s.OAt-."b.In"..I...J*.~H.:-...?..uV....dZ;z:.l.{.E.,.Q..i]:.0r.I.y..f...../j.wN...^R.....u....>..}....f.f...]A..C~;/....%..^#..N.a..........99.....`.....%..iS....S......$....)
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 6196 bytes, 2 files, at 0x44 "ThemePictureGrid.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22340
                                                                                                                  Entropy (8bit):7.668619892503165
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:GByvLdFHny7G8E0GftpBjE8upFLrHRN778lvQyUTL2mm2y:Oy3HkG8Pi6887mvU+ma
                                                                                                                  MD5:8B29FAB506FD65C21C9CD6FE6BBBC146
                                                                                                                  SHA1:CE1B8A57BB3C682F6A0AFC32955DAFD360720FDF
                                                                                                                  SHA-256:773AC516C9B9B28058128EC9BE099F817F3F90211AC70DC68077599929683D6F
                                                                                                                  SHA-512:AFA82CCBC0AEF9FAE4E728E4212E9C6EB2396D7330CCBE57F8979377D336B4DACF4F3BF835D04ABCEBCDB824B9A9147B4A7B5F12B8ADDADF42AB2C34A7450ADE
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....4.......D...........................4....?..................1...............ThemePictureGrid.glox.....1...........Content.inf....K..5.[.... V.q......B.....?.h.i.J.D...Z...>.....i~...A...Z....H.hy.D..X.....>...L.I..`. z w0}.K`.C{h....W\../.U..p\%...B...;............9..8.^M.....].lP.p...|..?..M....E..S.`..-n........Q'.'.o..C}=..?`.bQ...J"0f.. ....k3n..F.Pu..#...w].`<...."D.].-.#+):..fe..=<.M...4..s.q.f._.=.*T.M..U.[R.kbw.,......t6_I...~.X..$_.q....}2..BR...).[...<.l.3........h%....2.$`>..hG...0.6.S......._3.d~1.c.2g....7tTO..F.D.f.Y..WCG.B..T....Gg&.U'....u.S/......&6w..[bc.4....R.e..f.,....l."........I....J.=~...$x.&2...+,-.;.v.'.AQ.fc...v._..rZ..TYR...g?..Z..!.3mP dj...../...+...q.....>..../...]P.z?DW&.p..GZ....R5n......,..]{].0m.9...o.{...e."...8VH....w"%;.g\.K..p.}....#r.u..l.vS...Y.7U.N*-E@.....~....E...x.....C.......{NP....5Ymk.*._.K...Z...f..;.......b.....,._@B..\.S..d.'\rs..].}.5"XJU.J..'.zk}.+P.)C.X.?9sx.D....(K....P^N_D...Z.........
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 6450 bytes, 2 files, at 0x44 "ThemePictureAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22594
                                                                                                                  Entropy (8bit):7.674816892242868
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:L7d2l8FbHaaIKbtv1gDISi8E0GftpBjEZRFLrHRN74bUll7PK/pd:LUlCIOt/8Pi6Zv4bMId
                                                                                                                  MD5:EE0129C7CC1AC92BBC3D6CB0F653FCAE
                                                                                                                  SHA1:4ABAA858176B349BDAB826A7C5F9F00AC5499580
                                                                                                                  SHA-256:345AA5CA2496F975B7E33C182D5E57377F8B740F23E9A55F4B2B446723947B72
                                                                                                                  SHA-512:CDDABE701C8CBA5BD5D131ABB85F9241212967CE6924E34B9D78D6F43D76A8DE017E28302FF13CE800456AD6D1B5B8FFD8891A66E5BE0C1E74CF19DF9A7AD959
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF....2.......D...........................2....?..................0...............ThemePictureAccent.glox.....0...........Content.inf.o.@D..8.[.........B.....?. $...K.....~....aZ.WA"...k.......Z......."......"..X.fpB 2@d..87.[.A......p..e.'......F..P^%.%.RK...........T%0..........9..+8 ...&.q.....+.......^.fad^^n...d.....s1..... .3j.c-c7..y<.....6........C5n.KG...Rs[lt..ZkwI.!..Uj.ez_!A^: /.;.Rl4....^..<6..N...'.YY.n*.E{.`..s.7..z.......L.y.Y.....q.kx.....[5.+<to......1...L.r.m..kC.q.k.1..o.w8s.....xh.@.b.`l\...}z1.6..Y.</DY...Z5..D...0..4.;..XAA..0qD..E.....h...C..hH......S..Z.\.VBu......Rxs.+:RKzD......{......a..=......).<.....d.SM.......c!t.4.h..A=J~.>q?Hw.^.....?.....[..`....v.nl..A.u...S!...............c......b.J.I.....D...._?}..or.g.JZ#*."_``.>.....{...w......s...R.iXR..'z....S.z.\..f.....>7m..0q.c-8\..nZw.q..J.l....+..V....ZTs{.[yh..~..c........9;..D...V.s...#...JX~t8%......cP^...!.t......?..'.(.kT.T.y.I ...:..Y3..[Up.m...%.~
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Cabinet archive data, many, 9170 bytes, 2 files, at 0x44 "InterconnectedBlockProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):25314
                                                                                                                  Entropy (8bit):7.729848360340861
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:75V23GNhfG/YvmBqWDP7G8E0GftpBjEB1vrFLrHRN7mKll7PK/pRU0:LS/Yvc7TG8Pi6BLm6IS0
                                                                                                                  MD5:C47E3430AF813DF8B02E1CB4829DD94B
                                                                                                                  SHA1:35F1F1A18AA4FD2336A4EA9C6005DBE70013C7FC
                                                                                                                  SHA-256:F2DB1E60533F0D108D5FB1004904C1F2E8557D4493F3B251A1B3055F8F1507A3
                                                                                                                  SHA-512:6F8904E658EB7D04C6880F7CC3EC63FCFE31EF2C3A768F4ECF40B115314F23774DAEE66DCE9C55FAF0AD31075A3AC27C8967FD341C23C953CA28BDC120997287
                                                                                                                  Malicious:false
                                                                                                                  Preview:MSCF.....#......D............................#...?...................#..............InterconnectedBlockProcess.glox......#..........Content.inf...<.:#.$[......O..........5f.P.5CU..6..jT..U..U..UM.T.........h................-... .......6...`.....G...........'.,DN:........... "..4..1u.....%.u..{{,....@lp..}..`.......Z...K.....Z..... Z4.<?..C.BF.....k.!Hl...]...Tvf..g....)...vny6.'..f....Z.R.`.......+....!..!.....:..4fj....."q..f..E..^!k.....M.c....R...B......g...~.........o.'.7,.e.,..7.R.e,(.+..+:....Q....f...P.H.I..U.....Jl...l...z.]7...C...<...L.,..@...i.{..e]K...2..KRW..7.-'.G.l!.n7..J.v.C...%/.....q...@..l..e..$..N..sg8]oo.(q(_.?.X.s...Ua..r0...Rz.o.eT.j...b*..}",n.qou..M.[.;%../c.x.4.z.2*.U.]..D...h...-R.$.=\3..P......N.mP......J...}BPn...g]d.5k..C.ee.ml...\.g...[.......<..6$.%.I#S9..I...6.i........_..P.n....c$.3..zw.hF......_{.+...o...[.&........&...M..m.....;....0....D7...4nQ.=/.._`._.nh.D.m..h.+....8..p..q.4.w.\...iy...*...lN6F..c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):30
                                                                                                                  Entropy (8bit):1.2389205950315936
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:8Rllt:8R
                                                                                                                  MD5:90E7CE70F12B55AB383AA11B60E8EDBA
                                                                                                                  SHA1:389316C77B355108A46552579B52387253933F66
                                                                                                                  SHA-256:C4BBFADD22DB4AD2B168A8A7EBC7CA25129517B9F818BDC2630B049D2FACEF9C
                                                                                                                  SHA-512:D920E3927225E4CA77A8889290ED09D08DB4E05E74DF50BCCCE31788FB2D2A624DD443A4958EF23D9D67608520C3FAE50F3E672CE108FBB8BD4C2B87D742E1A7
                                                                                                                  Malicious:false
                                                                                                                  Preview:....K.........................
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Dec 3 10:46:56 2024, mtime=Tue Dec 3 10:47:02 2024, atime=Mon Dec 2 20:13:15 2024, length=230038, window=hide
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):600
                                                                                                                  Entropy (8bit):4.582432935872778
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:4xtQl3m6b5qUlatl0kl//5jsVCEUO/RsZ+IcccljAlxx23LXlIRo3wrmkVIavGmV:8WsRl0sXEn3cUjAULXlrzBmV
                                                                                                                  MD5:B5B06EA5C55E5DEED060CEE8519FB74B
                                                                                                                  SHA1:682762817F8632D55F3914CFA5A5CB061C2A2034
                                                                                                                  SHA-256:359903F5D216266DE1D6336B7F04EEA1A0CF7F7B67AB09F94AAE89BCD4193C7F
                                                                                                                  SHA-512:67CF20A39C7AB27DC920BE075B632283D9BE2497E0E64A9301CD05EDB70CF9C6D983276C310D9637DAE48C0C8DD07471BA72845D33D94D2041D1B9CAA68BC3EF
                                                                                                                  Malicious:false
                                                                                                                  Preview:L..................F.... ...+T..yE..._.yE......D...............................P.O. .:i.....+00.../C:\...................P.1......Y.]..intel.<......Y.].Y.]..........................C...i.n.t.e.l.....Z.2......Y.. .DOC~1.DOC.B......Y.].Y.]..........................,dE.D.o.c...d.o.c.x.......@...............-.......?............F.......C:\intel\Doc.docx..#.....\.....\.....\.....\.....\.....\.....\.i.n.t.e.l.\.D.o.c...d.o.c.x.`.......X.......992547...........hT..CrF.f4... .>.T..b...,.......hT..CrF.f4... .>.T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Generic INItialization configuration [folders]
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):41
                                                                                                                  Entropy (8bit):4.247557492317427
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:HqdLBCm4UcBCv:HA9hGs
                                                                                                                  MD5:CE7BCCD008058E0D96C85995FABBDC9F
                                                                                                                  SHA1:939A8927196DC4C5E90B32234C1484B72052F5A1
                                                                                                                  SHA-256:2AD83E8B46EF787ABC53DC07C6D648975AF14441067BCC46017DA2B1A3DEE6CC
                                                                                                                  SHA-512:6D2B32C16C0B0E330EDC39C20F0666CC128F5A16D82E34837D7951FE71E02B8A5BA20CD3F0ECAA58D570B110FFCCA113FC87D4CA5C4ACBE3B557B21F20CAB872
                                                                                                                  Malicious:false
                                                                                                                  Preview:[misc]..Doc.LNK=0..[folders]..Doc.LNK=0..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):562113
                                                                                                                  Entropy (8bit):7.67409707491542
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                                                                                  MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                                                                                  SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                                                                                  SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                                                                                  SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1649585
                                                                                                                  Entropy (8bit):7.875240099125746
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                                                                                  MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                                                                                  SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                                                                                  SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                                                                                  SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):558035
                                                                                                                  Entropy (8bit):7.696653383430889
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                                                                                  MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                                                                                  SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                                                                                  SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                                                                                  SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):570901
                                                                                                                  Entropy (8bit):7.674434888248144
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                                                                                  MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                                                                                  SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                                                                                  SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                                                                                  SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):523048
                                                                                                                  Entropy (8bit):7.715248170753013
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                                                                                  MD5:C276F590BB846309A5E30ADC35C502AD
                                                                                                                  SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                                                                                  SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                                                                                  SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3078052
                                                                                                                  Entropy (8bit):7.954129852655753
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                                                                                  MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                                                                                  SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                                                                                  SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                                                                                  SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):777647
                                                                                                                  Entropy (8bit):7.689662652914981
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                                                                                  MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                                                                                  SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                                                                                  SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                                                                                  SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):924687
                                                                                                                  Entropy (8bit):7.824849396154325
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                                                                                  MD5:97EEC245165F2296139EF8D4D43BBB66
                                                                                                                  SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                                                                                  SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                                                                                  SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):966946
                                                                                                                  Entropy (8bit):7.8785200658952
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                                                                                  MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                                                                                  SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                                                                                  SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                                                                                  SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1204049
                                                                                                                  Entropy (8bit):7.92476783994848
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                                                                                  MD5:FD5BBC58056522847B3B75750603DF0C
                                                                                                                  SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                                                                                  SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                                                                                  SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):486596
                                                                                                                  Entropy (8bit):7.668294441507828
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                                                                                  MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                                                                                  SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                                                                                  SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                                                                                  SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):976001
                                                                                                                  Entropy (8bit):7.791956689344336
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                                                                                  MD5:9E563D44C28B9632A7CF4BD046161994
                                                                                                                  SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                                                                                  SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                                                                                  SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1463634
                                                                                                                  Entropy (8bit):7.898382456989258
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                                                                                  MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                                                                                  SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                                                                                  SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                                                                                  SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2218943
                                                                                                                  Entropy (8bit):7.942378408801199
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                                                                                  MD5:EE33FDA08FBF10EF6450B875717F8887
                                                                                                                  SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                                                                                  SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                                                                                  SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1750795
                                                                                                                  Entropy (8bit):7.892395931401988
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                                                                                  MD5:529795E0B55926752462CBF32C14E738
                                                                                                                  SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                                                                                  SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                                                                                  SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2924237
                                                                                                                  Entropy (8bit):7.970803022812704
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                                                                                  MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                                                                                  SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                                                                                  SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                                                                                  SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2357051
                                                                                                                  Entropy (8bit):7.929430745829162
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                                                                                  MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                                                                                  SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                                                                                  SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                                                                                  SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3611324
                                                                                                                  Entropy (8bit):7.965784120725206
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                                                                                  MD5:FB88BFB743EEA98506536FC44B053BD0
                                                                                                                  SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                                                                                  SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                                                                                  SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1091485
                                                                                                                  Entropy (8bit):7.906659368807194
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                                                                                  MD5:2192871A20313BEC581B277E405C6322
                                                                                                                  SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                                                                                  SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                                                                                  SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):608122
                                                                                                                  Entropy (8bit):7.729143855239127
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                                                                                  MD5:8BA551EEC497947FC39D1D48EC868B54
                                                                                                                  SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                                                                                  SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                                                                                  SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5783
                                                                                                                  Entropy (8bit):7.88616857639663
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                                                                                  MD5:8109B3C170E6C2C114164B8947F88AA1
                                                                                                                  SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                                                                                  SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                                                                                  SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4026
                                                                                                                  Entropy (8bit):7.809492693601857
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                                                                                  MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                                                                                  SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                                                                                  SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                                                                                  SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4243
                                                                                                                  Entropy (8bit):7.824383764848892
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                                                                                  MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                                                                                  SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                                                                                  SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                                                                                  SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):16806
                                                                                                                  Entropy (8bit):7.9519793977093505
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                                                                                  MD5:950F3AB11CB67CC651082FEBE523AF63
                                                                                                                  SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                                                                                  SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                                                                                  SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):11380
                                                                                                                  Entropy (8bit):7.891971054886943
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                                                                                  MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                                                                                  SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                                                                                  SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                                                                                  SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6024
                                                                                                                  Entropy (8bit):7.886254023824049
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                                                                                  MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                                                                                  SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                                                                                  SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                                                                                  SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):9191
                                                                                                                  Entropy (8bit):7.93263830735235
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                                                                                  MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                                                                                  SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                                                                                  SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                                                                                  SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4326
                                                                                                                  Entropy (8bit):7.821066198539098
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                                                                                  MD5:D32E93F7782B21785424AE2BEA62B387
                                                                                                                  SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                                                                                  SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                                                                                  SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):7370
                                                                                                                  Entropy (8bit):7.9204386289679745
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                                                                                  MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                                                                                  SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                                                                                  SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                                                                                  SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5596
                                                                                                                  Entropy (8bit):7.875182123405584
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                                                                                  MD5:CDC1493350011DB9892100E94D5592FE
                                                                                                                  SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                                                                                  SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                                                                                  SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3683
                                                                                                                  Entropy (8bit):7.772039166640107
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                                                                                  MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                                                                                  SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                                                                                  SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                                                                                  SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4888
                                                                                                                  Entropy (8bit):7.8636569313247335
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                                                                                  MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                                                                                  SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                                                                                  SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                                                                                  SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6448
                                                                                                                  Entropy (8bit):7.897260397307811
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                                                                                  MD5:42A840DC06727E42D42C352703EC72AA
                                                                                                                  SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                                                                                  SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                                                                                  SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5630
                                                                                                                  Entropy (8bit):7.87271654296772
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                                                                                  MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                                                                                  SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                                                                                  SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                                                                                  SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6193
                                                                                                                  Entropy (8bit):7.855499268199703
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                                                                                  MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                                                                                  SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                                                                                  SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                                                                                  SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3075
                                                                                                                  Entropy (8bit):7.716021191059687
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                                                                                  MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                                                                                  SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                                                                                  SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                                                                                  SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft OOXML
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):5151
                                                                                                                  Entropy (8bit):7.859615916913808
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                                                                                  MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                                                                                  SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                                                                                  SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                                                                                  SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):333258
                                                                                                                  Entropy (8bit):4.654450340871081
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                                                                                  MD5:5632C4A81D2193986ACD29EADF1A2177
                                                                                                                  SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                                                                                  SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                                                                                  SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):296658
                                                                                                                  Entropy (8bit):5.000002997029767
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                                                                                  MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                                                                                  SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                                                                                  SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                                                                                  SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):268317
                                                                                                                  Entropy (8bit):5.05419861997223
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                                                                                  MD5:51D32EE5BC7AB811041F799652D26E04
                                                                                                                  SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                                                                                  SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                                                                                  SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):255948
                                                                                                                  Entropy (8bit):5.103631650117028
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                                                                                  MD5:9888A214D362470A6189DEFF775BE139
                                                                                                                  SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                                                                                  SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                                                                                  SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):251032
                                                                                                                  Entropy (8bit):5.102652100491927
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                                                                                  MD5:F425D8C274A8571B625EE66A8CE60287
                                                                                                                  SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                                                                                  SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                                                                                  SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):284415
                                                                                                                  Entropy (8bit):5.00549404077789
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                                                                                  MD5:33A829B4893044E1851725F4DAF20271
                                                                                                                  SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                                                                                  SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                                                                                  SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):294178
                                                                                                                  Entropy (8bit):4.977758311135714
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                                                                                  MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                                                                                  SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                                                                                  SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                                                                                  SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):270198
                                                                                                                  Entropy (8bit):5.073814698282113
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                                                                                  MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                                                                                  SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                                                                                  SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                                                                                  SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):217137
                                                                                                                  Entropy (8bit):5.068335381017074
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                                                                                  MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                                                                                  SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                                                                                  SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                                                                                  SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):254875
                                                                                                                  Entropy (8bit):5.003842588822783
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                                                                                  MD5:377B3E355414466F3E3861BCE1844976
                                                                                                                  SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                                                                                  SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                                                                                  SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):344303
                                                                                                                  Entropy (8bit):5.023195898304535
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                                                                                  MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                                                                                  SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                                                                                  SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                                                                                  SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):250983
                                                                                                                  Entropy (8bit):5.057714239438731
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                                                                                  MD5:F883B260A8D67082EA895C14BF56DD56
                                                                                                                  SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                                                                                  SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                                                                                  SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                                                                                  Malicious:false
                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):51826
                                                                                                                  Entropy (8bit):5.541375256745271
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                                                                                  MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                                                                                  SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                                                                                  SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                                                                                  SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):47296
                                                                                                                  Entropy (8bit):6.42327948041841
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                                                                                  MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                                                                                  SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                                                                                  SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                                                                                  SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):34415
                                                                                                                  Entropy (8bit):7.352974342178997
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                                                                                  MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                                                                                  SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                                                                                  SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                                                                                  SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):3465076
                                                                                                                  Entropy (8bit):7.898517227646252
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                                                                                  MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                                                                                  SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                                                                                  SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                                                                                  SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):12
                                                                                                                  Entropy (8bit):0.41381685030363374
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:/l:
                                                                                                                  MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                                                  SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                                                  SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                                                  SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                                                  Malicious:false
                                                                                                                  Preview:............
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):12
                                                                                                                  Entropy (8bit):0.41381685030363374
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:/l:
                                                                                                                  MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                                                  SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                                                  SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                                                  SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                                                  Malicious:false
                                                                                                                  Preview:............
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):12
                                                                                                                  Entropy (8bit):0.41381685030363374
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:/l:
                                                                                                                  MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                                                  SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                                                  SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                                                  SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                                                  Malicious:false
                                                                                                                  Preview:............
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):12
                                                                                                                  Entropy (8bit):0.41381685030363374
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:/l:
                                                                                                                  MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                                                  SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                                                  SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                                                  SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                                                  Malicious:false
                                                                                                                  Preview:............
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: RMS - Host 7.2, Comments: This installer contains the logic and data to install RMS - Host 7.2, Keywords: Installer,MSI,Database, Subject: RMS - Host 7.2, Author: TektonIT, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Thu Jul 18 02:24:09 2024, Create Time/Date: Thu Jul 18 02:24:09 2024, Last Printed: Thu Jul 18 02:24:09 2024, Revision Number: {134AA6F2-2A49-44F2-A7A5-B7B9233956FA}, Code page: 1251, Template: Intel;1049
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26864640
                                                                                                                  Entropy (8bit):7.924911310016854
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:393216:3fWbJGFHH0km5pmwUs1211e50MRZDzPHPRn9xrUVaWILZPLM4ShshVK6KZ478Qic:3fRLmf21sq8P50dILZPLzVK6D
                                                                                                                  MD5:24F15E659ECB67862F4C6E72726BFCA7
                                                                                                                  SHA1:75D90172D7A315A31A484629DC8573367F3E544A
                                                                                                                  SHA-256:F11C06F1FD567E26FB4CE9999749516B6E47ADE4EE0B7B875A75A5CBFB74DC04
                                                                                                                  SHA-512:913C9FB7FDCA7F9F7DD7077C34092E76E42D88802406C9A5F6E8AA0C21E4F21FEE850A39B95982EFE9ED4A2D022A95C30739CC20DC65F3C6722B6022D8F76B3C
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...................................8........6........................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5..........;................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...A...M...:...<.......=.......?...@...T...B...C...D...E...F...G...H...I...J...O...L...N...n.......P...Q...R...U...........Z...W...X...Y.......[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: RMS - Host 7.2, Comments: This installer contains the logic and data to install RMS - Host 7.2, Keywords: Installer,MSI,Database, Subject: RMS - Host 7.2, Author: TektonIT, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Thu Jul 18 02:24:09 2024, Create Time/Date: Thu Jul 18 02:24:09 2024, Last Printed: Thu Jul 18 02:24:09 2024, Revision Number: {134AA6F2-2A49-44F2-A7A5-B7B9233956FA}, Code page: 1251, Template: Intel;1049
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26864640
                                                                                                                  Entropy (8bit):7.924911310016854
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:393216:3fWbJGFHH0km5pmwUs1211e50MRZDzPHPRn9xrUVaWILZPLM4ShshVK6KZ478Qic:3fRLmf21sq8P50dILZPLzVK6D
                                                                                                                  MD5:24F15E659ECB67862F4C6E72726BFCA7
                                                                                                                  SHA1:75D90172D7A315A31A484629DC8573367F3E544A
                                                                                                                  SHA-256:F11C06F1FD567E26FB4CE9999749516B6E47ADE4EE0B7B875A75A5CBFB74DC04
                                                                                                                  SHA-512:913C9FB7FDCA7F9F7DD7077C34092E76E42D88802406C9A5F6E8AA0C21E4F21FEE850A39B95982EFE9ED4A2D022A95C30739CC20DC65F3C6722B6022D8F76B3C
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...................................8........6........................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5..........;................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...A...M...:...<.......=.......?...@...T...B...C...D...E...F...G...H...I...J...O...L...N...n.......P...Q...R...U...........Z...W...X...Y.......[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1447471
                                                                                                                  Entropy (8bit):4.935925476310217
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:gMMMMMMSLLLLLLLFMMMMMMSLLLLLLLsMMMMMMSLLLLLLLi:gMMMMMMSLLLLLLLFMMMMMMSLLLLLLLsb
                                                                                                                  MD5:1CA6AFDAA28C89A3DA9D147451DE3DA0
                                                                                                                  SHA1:E8B38F0FCA62157CBCFF3FA1D743412E86F748F7
                                                                                                                  SHA-256:CC5FFE2CC894DDA983B797CB7E4014282F9B5120C62FE7B2F167D0041CFC98AC
                                                                                                                  SHA-512:523841C4DB1AD1826B4E4CE889CF23B68BF930BDFF12B7002E3DBEEB94310EA8289550CE28DBEBC3E615B1414034D96E0EE3BA9D660EE65D8E270021C04CD608
                                                                                                                  Malicious:false
                                                                                                                  Preview:...@IXOS.@.....@.5.Y.@.....@.....@.....@.....@.....@......&.{77817ADF-D5EC-49C6-B987-6169BBD5345B} .Remote Manipulator System - Host..Word.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{134AA6F2-2A49-44F2-A7A5-B7B9233956FA}.....@.....@.....@.....@.......@.....@.....@.......@.... .Remote Manipulator System - Host......Rollback....B.:.0.B. .4.5.9.A.B.2.8.O.:...[1]..RollbackCleanup..#.4.0.;.5.=.8.5. .2.@.5.<.5.=.=.K.E. .D.0.9.;.>.2...$.0.9.;.:. .[.1.]....@.......@........ProcessComponents"...1.=.>.2.;.5.=.8.5. .@.5.3.8.A.B.@.0.F.8.8. .:.>.<.?.>.=.5.=.B.>.2....@.....@.....@.]....&.{74F2505E-B20A-4AED-968F-AE5B278DB38A}8.C:\Program Files (x86)\Remote Manipulator System - Host\.@.......@.....@.....@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}...@.......@.....@.....@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}...@.......@.....@.....@...........@....&.{00000000-0000-0000-0000-000000000000}.@.....@.....@......&.{182310A2-CD9E-4171-ACD1-3AEDD260A15F}D.C:\Program Files (x86)\Remote Manip
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):169896
                                                                                                                  Entropy (8bit):6.068969720857241
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:jqSoP/44Yvge5XKhpKJJdu+ew+BZPHbN2e9n2p+:j5g/ve5XKhMVJSIun6+
                                                                                                                  MD5:B5ADF92090930E725510E2AAFE97434F
                                                                                                                  SHA1:EB9AFF632E16FCB0459554979D3562DCF5652E21
                                                                                                                  SHA-256:1F6F0D9F136BC170CFBC48A1015113947087AC27AED1E3E91673FFC91B9F390B
                                                                                                                  SHA-512:1076165011E20C2686FB6F84A47C31DA939FA445D9334BE44BDAA515C9269499BD70F83EB5FCFA6F34CF7A707A828FF1B192EC21245EE61817F06A66E74FF509
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._`,"..Bq..Bq..Bq..q..Bq<.q..Bq..q..Bq..q/.Bq..qh.Bq.y.q..Bq.y.q..Bq..Cq..Bq..q..Bq..q..Bq..q..Bq...q..Bq..q..BqRich..Bq........PE..L.....,a...........!.....p...$......................................................U..................................m............`..p............x.......p..........................................@............................................text....o.......p.................. ..`.rdata..M............t..............@..@.data....1... ......................@....rsrc...p....`.......$..............@..@.reloc...L...p...N...*..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20480
                                                                                                                  Entropy (8bit):1.1611785889279091
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12:JSbX72Fja+AGiLIlHVRpzh/7777777777777777777777777vDHF5t07x6uPp01z:JzQI53vt016uy8F
                                                                                                                  MD5:ED79AE62C6D5ED3859C11A201E2F69D1
                                                                                                                  SHA1:BB576EEC94485660268EF49FCBEE5D02C86172B4
                                                                                                                  SHA-256:C6C17A711852130461BF83871470CEFB7E28FF45F56545782888A9A77AF715FA
                                                                                                                  SHA-512:0452195DF74E216DC02F899B79A15FEDDC5F4981CADDB70C945F2047B97A2FCAF836F1FB263E0AC6AA2751D53295992E0E3BD58CD13DF65A12E800F8B55422A0
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20480
                                                                                                                  Entropy (8bit):1.9233781749241923
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:58PhhuRc06WXOcjT5GNsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOdS:0hh1ajTANsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:644E7622B10943EDACD2EE57FD350584
                                                                                                                  SHA1:DA5277A2FBD14BE0AA0D0CA9F9C97A68EE903EBE
                                                                                                                  SHA-256:17C1F2A1CE27DD40E6A1A85DE695A51ECF1E44FDF401206FC34A57F3241EC4A6
                                                                                                                  SHA-512:FEEBAF0BB5F2FE2FB2DEE488C39EE32D7343FA77D246876FA13A7376C6EE2E267BA83CAA5237A58F0E776C1C78168155D967CBF54A2998274FD5A8EDA19E9CC7
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):79000
                                                                                                                  Entropy (8bit):5.817675016279098
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:/MAyYdTmPJbgqcnDckJ42T1IPAMxkEo2T1OtoAMxkEbK:/1U81ckJ52xVPxnK
                                                                                                                  MD5:E8CBBBE641AA6205C0E028CE7DC72CFE
                                                                                                                  SHA1:E845FB6044E5F611F4F990B76AA4762FAB6E96C9
                                                                                                                  SHA-256:61481606FE3FF53C9483586B4A95181D96F5679667ACCD582166069B10233D77
                                                                                                                  SHA-512:D12E6BBA83F1B41BB2B937B315C5CDD3ADFA60C318AD1E958D99251822810739D2C6EC75B664BBC3116B0CDBBBFA4BEBA234B8C604F303391E21CDA0C24767E5
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L.....-a.................@...................P....@.........................................................................4T..(.......t0...............d...........................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...t0.......@..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):70808
                                                                                                                  Entropy (8bit):5.60723121147002
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:RdMAyYdTmPJbgqcnDc/soJP2T1qAMxkEvQ2T1h8uAMxkE4:/1U81cLJOGxF/hxM
                                                                                                                  MD5:F0F36966AD2B91DBE0C8B9D4E0A1AB0E
                                                                                                                  SHA1:B7787445DDD42A3B4753AFC0B02B270DDC1693FC
                                                                                                                  SHA-256:BE3C9594F315F2CE2698DFF54F7B41F012B25BF208DD88CEA7AC92936EC84AE9
                                                                                                                  SHA-512:B178A35B3F0A3CA67D632901C1F0AF309F51267DFA827AE029475C63BCF2BA51694C717C94989D7E457E915DAE74B43C3C6B405113249A7B1FF0E9BAE67E0949
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L.....-a.................@...`...............P....@.........................................................................4T..(.......\................d...........................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...\........ ..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):423064
                                                                                                                  Entropy (8bit):4.6899574334599645
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:c1U81cqS/ZJgAmxJtAqXy/yxREpU1WyY68iuuuu6AppppppppEMMMMMMMSLLLLL+:UjcT6uuuutMMMMMMSLLLLLLLeYTZg
                                                                                                                  MD5:6A9AA00C428A946F9A5C5546A458ECA0
                                                                                                                  SHA1:06A70B197DEE2FC106576C6719CFF046D2747396
                                                                                                                  SHA-256:16601981E37F2FE16B8E0EA4626ABF57013458B63D1A71C8FA3B5080F3C191F5
                                                                                                                  SHA-512:EADDEE089D18ED744BB1DCAAA98A8F6E201022432C55D037D2A7EF994532197EF595E44DEEF9DB0CFAE8ACA50F4AB90CEEDB49F8E920E6B4FAF6C60B6EFEDD51
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L.....-a.................@...................P....@.................................v.......................................4T..(........u...............d...........................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....u..........................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):423064
                                                                                                                  Entropy (8bit):4.690218208041496
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:R1U81cqS/ZJgAmxJtAqXy/yxREpU1WyY68iuuuu6AppppppppEMMMMMMMSLLLLLe:DjcT6uuuutMMMMMMSLLLLLLLeYuGVk
                                                                                                                  MD5:AB85C5EEAD096C4E5D0A2914C24F59B2
                                                                                                                  SHA1:E189F9BA583B0A4EEE1C817C9DA8A5D72A038A83
                                                                                                                  SHA-256:F4F656CC3CD99ABC4CFC1A70BD77C52E36D59852987BE530E131CEF8238F4BA7
                                                                                                                  SHA-512:E70ACF9FCA9F0378FAC97421550984FF166D8D1D83F423400B108E804CA876EA6D7517398637D64C34CC0E46C14048BB9F50C8268D993FA983DB6B0E44A9C352
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L.....-a.................@...................P....@.................................>.......................................4T..(........u...............d...........................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....u..........................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):423064
                                                                                                                  Entropy (8bit):4.690232052098797
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:o1U81cqS/ZJgAmxJtAqXy/yxREpU1WyY68iuuuu6AppppppppEMMMMMMMSLLLLLU:IjcT6uuuutMMMMMMSLLLLLLLeYFuv
                                                                                                                  MD5:03A18CE97AA1C45D834524B8A408BC17
                                                                                                                  SHA1:72ABD8B4AC974928684B6D089F8573C70D431808
                                                                                                                  SHA-256:0ACFCA29B6128E0161B4E6D93FFF7686A96128016846625763DAB7F9CE059DEF
                                                                                                                  SHA-512:2A2DC903E4179EC83BB4FA557FFCCE8BA3D8FC175E9C817D34BA186704ECF06A281D96D35B12B8D54FE35683030942FDC9A3A1FDFDBEAA755A60436F3C7B3483
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L.....-a.................@...................P....@........................................................................4T..(........u...............d...........................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....u..........................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):432221
                                                                                                                  Entropy (8bit):5.375180090542907
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauB:zTtbmkExhMJCIpErg
                                                                                                                  MD5:E91242520C27FDFA440A3FC93C98876F
                                                                                                                  SHA1:98CD944744AB3FA7A41424C657D4F6106FE1AE70
                                                                                                                  SHA-256:024435C116F55577D006D0D730DABDB878771B1D782D057F8D028F5CF1D74C2D
                                                                                                                  SHA-512:A04915F6DB5250226E552A844803C12FEB8136CE2FF19BF720BCAA8EFE8F7E7DF9BFF3067BB8CFAC4ABFA1388442DEE828AC00EF0E0D44F9F6779B6D98986E28
                                                                                                                  Malicious:false
                                                                                                                  Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                  File Type:JSON data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):55
                                                                                                                  Entropy (8bit):4.306461250274409
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                  Malicious:false
                                                                                                                  Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1712
                                                                                                                  Entropy (8bit):7.607072872097237
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24:Vk1IRjhPyjI5w6GlktA7FPSGBAS7jF78oekZdCrphruWeI8h6FfymkBZGfKkamou:HwI66lKpj9BdCusxIsfLamo3T6
                                                                                                                  MD5:92B4768535FBAE2B8196873594AC03B3
                                                                                                                  SHA1:D2C252C68467CFE5CF09AD4565F8CC68FD39691D
                                                                                                                  SHA-256:FE9A668474C969291050953E87A2684F5B9E5AA6368D0CC83FBDF70FF824448E
                                                                                                                  SHA-512:607E281D338AB15F2D79B6D06EDB795649866A22B09C7ED2782D8DFFE084492C1737866E6DA89C533406EDD7AA9AEF6E8CD1135D6ADB96941B3C48CDB384C80C
                                                                                                                  Malicious:false
                                                                                                                  Preview:0..........0.....+.....0......0...0..........j.....*.t......*..20241203090447Z0s0q0I0...+..............B..M.%..Dg..5 .....F...x9...C.VP..;..w.......T..r...G....20241203090447Z....20241207090446Z0...*.H...............M.w.wo.eo..2).?#V.*g....0.......V.:....q....b......Fl..\...v1q.?.#.Ig.....Tk.x..O.@..<V..Z.:.5.e.IA.2Wo..^*s...j.7.].[.$.&.h.|....p..&yf.?..."......k..!w.....$8.5?.j.].a:`fId.+.,=.@}b.-.=W.g.p..@..Q......s.. .f.'..|a.....[.....%..>..%..z.p....0...0...0............|.w.7@$.L.!...0...*.H........0S1.0...U....BE1.0...U....GlobalSign nv-sa1)0'..U... GlobalSign Code Signing Root R450...240717031756Z..250215000000Z0g1.0...U....BE1.0...U....GlobalSign nv-sa1=0;..U...4GlobalSign Code Signing Root R45 - OCSP 1.2 202411070.."0...*.H.............0............U...;..pc+..o.K..0...6.'...F.C..}.....%E..F.q.-\.u{..$.....#8.,{...^OEQ..P..~ZU..f.0........Ky+..(..q.............sy...e.0...Z.]X1.A....z.....g.p.{.~,u.0R..f.SOx".Q_.{......`T.&[&2..P|.......h.Z(A;.3.]$...k`.
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1680
                                                                                                                  Entropy (8bit):7.601858951809015
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:+sU2OhYVI2j37nIxCw5DgSUnpU446J8WpNTE:FmYVI2j37n4Cw5MSiw6mOTE
                                                                                                                  MD5:1B4D8125E67CB516C9D001CCB2A999BC
                                                                                                                  SHA1:9CAEE4DA6C9D3F0BBE42A10F8CE37A872E24FBD9
                                                                                                                  SHA-256:657B6EC6B34F8BAD97EB5966F4D8E224AD0A6B6DAF6CDD19FBD06422320BAF70
                                                                                                                  SHA-512:523CC60E8F14610D23987227E4C1FF9E113E78936B994570402C9EE091E257CA5AB83514A54B7C1B4969DEA835BF88735B9A85150FEDA6EFB7132D279FE1C92C
                                                                                                                  Malicious:false
                                                                                                                  Preview:0..........0.....+.....0.....r0..n0............`...H,.&...=...20241203095041Z0o0m0E0...+...........r...nK..._..[.Q.....$..kw...Y.!gdv.x..vF...M...k3....20241203095041Z....20241207095040Z0...*.H..............UJ.U.o4.+S..;....mW..0....S....../.9..U0................te9.gR..n..;AtfPB$..p\.z.....2..s...{.].].@..Nbq,..Y.vSJ.0..$.DU.Fsv.3.u...2.{/.....P..=...q..H...z..x...w.C`Q(_....@....*.................A"...C.o...Q.........c.,Js...'...._..N$Rh4.R.Z....0...0...0..........f3...z.....0...*.H........0Y1.0...U....BE1.0...U....GlobalSign nv-sa1/0-..U...&GlobalSign GCC R45 CodeSigning CA 20200...240920234113Z..241221234112Z0Z1.0...U....BE1.0...U....GlobalSign nv-sa100...U...'gsgccr45codesignca2020CA OCSP Responder0.."0...*.H.............0.........+..6b.I...$...f.C.K?}.s...r;.y.m,]q.....@.N.2..x.F5Y........%.).....>.yH.....*.\.9.<..ns..,..jQ.....~..V.N..Y.........8.a..Rg..A3....[.p<......by..Y.y...9....7%.%.i$..I..T~........2i....R..rW..~.!..e...;....\.9;<L.._..I.Fe.
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1435
                                                                                                                  Entropy (8bit):7.48674266225811
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24:qMcjIZwMV4Z0+v54Lvu94gpNORwfF7YpQfvmE1yPq8hruWa2tHP+HLuuDXXWLaH:J7uMVm0+v6LWbORK9q3nPq4uRY4Luubf
                                                                                                                  MD5:888FC9DCC34F2A8710436B5F311CCB7D
                                                                                                                  SHA1:7E61C4C4039A45A47B35201DD19283E26B104AA6
                                                                                                                  SHA-256:F10B877B9ADE37233E24F4F8CB2B83A8C191E7BA37B979353DC0BC56B486FC28
                                                                                                                  SHA-512:AFF0909157644C0B18FC9063F1DE471319FBE3D360BCC5E80BC5AAAEB23D4EC1091273B6F8D1D204AED2473E04542930E393D63F97FB28D327BC81C126F61402
                                                                                                                  Malicious:false
                                                                                                                  Preview:0..........0.....+.....0.....}0..y0......$L..|6..h(4.]........20241203094135Z0s0q0I0...+..........h.$..*y.u.3.V..G.....K...E$.MP.c.........x..BEp.A.o...T....20241203094135Z....20241207094134Z0...*.H...............x=...Hx.o>.A...S?+^.@GU.O.F...t....rL[s..A.7.p......n.8.G1S?....J..`..u?...b..}.r.C...c..@.w...i.s.W..0E..z.+.9...a.../='7...Ld>.)....'...E../8.h.i...=..ka..%..}kW..+./s.X."....>.Q?p...{.....l.U>o...14.Z.lu..\yGG...2...^...}..%*0S}Q.............0...0...0............|.X........-..0...*.H........0L1 0...U....GlobalSign Root CA - R31.0...U....GlobalSign1.0...U....GlobalSign0...240717031720Z..250215000000Z0Y1.0...U....BE1.0...U....GlobalSign nv-sa1/0-..U...&GlobalSign Root R3 - OCSP 1.2 202411070.."0...*.H.............0..........U\m..$*.o@E.<.c.*.).S..L...HN.<W|.F .........h...zo..vk..%M.".j.P..U!/..v.Th.R..(.i..$P....^l..@qe....q.l..6....cB.:.;.KU......J..*>.....$..(.h J.6;.....N..(r).i.*...o.<-..c..2.]<.7r.../.Ni..}q...8B.LT./'...=b.>....C........"..
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):532
                                                                                                                  Entropy (8bit):3.9575073130443283
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12:6w/z/DWzJqe3KQj22iv8sFF1gUeMalCrlQNlVgfMk21PUJS:dz/DgJRjYvP+U7uCKlCMmI
                                                                                                                  MD5:3041A242B1C9FB2E91341FF3B066E5C3
                                                                                                                  SHA1:0E3A3B70A79EE5FE1F20911ACF4321C42242EDAF
                                                                                                                  SHA-256:1B5B8E97C918077ECCE0E3158C3F0DA25F90C26D13B50DD69B77715E03BCE416
                                                                                                                  SHA-512:1F99C742C4C5F3945E99198EEFEBC703D0B51C1D15D9CC3A27DCDFF01855A582F5523D342D166CF8BE803B8143603F9A926FFE9D8CDB05036E952E377D68CE89
                                                                                                                  Malicious:false
                                                                                                                  Preview:p...... ....J....0..yE..(.................fbE...K...H...................K...H.. .........fbE......V...............h.t.t.p.:././.o.c.s.p...g.l.o.b.a.l.s.i.g.n...c.o.m./.c.o.d.e.s.i.g.n.i.n.g.r.o.o.t.r.4.5./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.V.F.Z.P.5.v.q.h.C.r.t.R.N.5.S.W.f.4.0.R.n.6.N.M.1.I.A.Q.U.H.w.C.%.2.F.R.o.A.K.%.2.F.H.g.5.t.6.W.0.Q.9.l.W.U.L.v.O.l.j.s.C.E.H.e.9.D.g.O.h.t.w.j.4.V.K.s.G.c.h.D.Z.B.E.c.%.3.D...".d.2.c.2.5.2.c.6.8.4.6.7.c.f.e.5.c.f.0.9.a.d.4.5.6.5.f.8.c.c.6.8.f.d.3.9.6.9.1.d."...
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):544
                                                                                                                  Entropy (8bit):3.914640336768837
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12:pexoXyzfDWzf79bLgLzK8sFAY6ealztksMuE8lJS/:pexXzfDgz9YLmvqY6muNJS/
                                                                                                                  MD5:09BBF961109107FBE772BED1A98842C8
                                                                                                                  SHA1:05C7398A538D7173CFF85C1889243DE893F770DD
                                                                                                                  SHA-256:41321C0DD6E3502297A68B44C9F18A0C99B42D6A881265876EDF581E9EF86D1E
                                                                                                                  SHA-512:2F7791CFC7D5DB2454D5ECB87F09C20FBD10ED0D3D823D23027ABD119A2B5815762CAF5D695483E3F7D4D442F0C42FA88C6145160D6B9306E0D2095E0381C60C
                                                                                                                  Malicious:false
                                                                                                                  Preview:p...... ....V.....D.yE..(.................:.hE...XIy.H...................XIy.H.. .........:.hE......V...............h.t.t.p.:././.o.c.s.p...g.l.o.b.a.l.s.i.g.n...c.o.m./.g.s.g.c.c.r.4.5.c.o.d.e.s.i.g.n.c.a.2.0.2.0./.M.E.0.w.S.z.B.J.M.E.c.w.R.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.T.L.u.A.3.y.g.n.K.W.%.2.F.7.x.u.S.x.%.2.F.0.9.F.%.2.B.h.H.V.u.E.U.Q.Q.U.2.r.O.N.w.C.S.Q.o.2.t.3.0.w.y.g.W.d.0.h.Z.2.R.2.C.3.g.C.D.H.Z.G.D.p.D.i.h.E.2.3.%.2.B.Y.N.r.M.w.%.3.D.%.3.D...".9.c.a.e.e.4.d.a.6.c.9.d.3.f.0.b.b.e.4.2.a.1.0.f.8.c.e.3.7.a.8.7.2.e.2.4.f.b.d.9."...
                                                                                                                  Process:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):508
                                                                                                                  Entropy (8bit):3.9846791409999285
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12:uAdLkIzVDWzFU8iv8sFt4QAfROA/pULrnnKsPDD/:CIzVDgFUhv/ofROS6LzKgD/
                                                                                                                  MD5:277832EE0750AB75CC27D75E98079A38
                                                                                                                  SHA1:2F31347B6D0A94461FAD7FB456E5E905AAD12A15
                                                                                                                  SHA-256:B518B39B61505B88F2972DBC4995555851EDFD59CF747087539576E7A8032CD5
                                                                                                                  SHA-512:EDBDF5F2DC02CA79C06DF1FB7BAB7F00DF27ED4EB533D3574CF5F477B232384EF9F72A346472671D8C36384314CD8F0AFB7D0904762B7124A712F52B066A176E
                                                                                                                  Malicious:false
                                                                                                                  Preview:p...... ....2......yE..(..................gE...[.3.H...................[.3.H.. ..........gE......V...............h.t.t.p.:././.o.c.s.p...g.l.o.b.a.l.s.i.g.n...c.o.m./.r.o.o.t.r.3./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.T.1.n.G.h.%.2.F.J.B.j.W.K.n.k.P.d.Z.I.z.B.1.b.q.h.e.l.H.B.w.Q.U.j.%.2.F.B.L.f.6.g.u.R.S.S.u.T.V.D.6.Y.5.q.L.3.u.L.d.G.7.w.C.E.H.g.D.G.E.J.F.c.I.p.B.z.2.8.B.u.O.6.0.q.V.Q.%.3.D...".7.e.6.1.c.4.c.4.0.3.9.a.4.5.a.4.7.b.3.5.2.0.1.d.d.1.9.2.8.3.e.2.6.b.1.0.4.a.a.6."...
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):73728
                                                                                                                  Entropy (8bit):0.27555231248128464
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:2IOYXSBwdgfdguOdghRXdgkdgpdgKdg4SKdgfdguOdghRXdgkdgpdgKdgt6Adgaf:HOGqvGkOzs94UGkOzs9t4N2
                                                                                                                  MD5:8A367515AA7151CD4C8766E1CCD242A0
                                                                                                                  SHA1:84D54B1B903167C4B71871681CD6BA10DFBD170B
                                                                                                                  SHA-256:585B731B4F632717413A55A27A5EFBF0DB82A471A82D0F9296D3628BDD71EC9E
                                                                                                                  SHA-512:F558F1EE2EB4280BE5652D560042F02B32F6382929F8015B71F2867939D9E92E5ABA323C7AFC6CC2B99A0607A56E1B51D6FC82BC00B31B47A45B92D7EF3DDE83
                                                                                                                  Malicious:false
                                                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):512
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                  Malicious:false
                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20480
                                                                                                                  Entropy (8bit):1.9233781749241923
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:58PhhuRc06WXOcjT5GNsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOdS:0hh1ajTANsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:644E7622B10943EDACD2EE57FD350584
                                                                                                                  SHA1:DA5277A2FBD14BE0AA0D0CA9F9C97A68EE903EBE
                                                                                                                  SHA-256:17C1F2A1CE27DD40E6A1A85DE695A51ECF1E44FDF401206FC34A57F3241EC4A6
                                                                                                                  SHA-512:FEEBAF0BB5F2FE2FB2DEE488C39EE32D7343FA77D246876FA13A7376C6EE2E267BA83CAA5237A58F0E776C1C78168155D967CBF54A2998274FD5A8EDA19E9CC7
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):20480
                                                                                                                  Entropy (8bit):1.9233781749241923
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:58PhhuRc06WXOcjT5GNsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOdS:0hh1ajTANsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:644E7622B10943EDACD2EE57FD350584
                                                                                                                  SHA1:DA5277A2FBD14BE0AA0D0CA9F9C97A68EE903EBE
                                                                                                                  SHA-256:17C1F2A1CE27DD40E6A1A85DE695A51ECF1E44FDF401206FC34A57F3241EC4A6
                                                                                                                  SHA-512:FEEBAF0BB5F2FE2FB2DEE488C39EE32D7343FA77D246876FA13A7376C6EE2E267BA83CAA5237A58F0E776C1C78168155D967CBF54A2998274FD5A8EDA19E9CC7
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):512
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                  Malicious:false
                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32768
                                                                                                                  Entropy (8bit):1.5164935908667418
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:LwZuUJvcFXO3T5XUky/NsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOo:0Z4qTZtsNsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:C0038655D7AE5DE8D232EE6D2EB25258
                                                                                                                  SHA1:BCEFEB5D89A84E055E3AD260D195CEAC2316ECE9
                                                                                                                  SHA-256:494947D770B1B79320DEA0D647F8D52ABDD30779CC38F796F8AE002A2E886684
                                                                                                                  SHA-512:0A859F4B56F269F1124738A7E71BE5AF419D17E72351686852FD0BB6F2FF34A26228F68C5C17FAD4E4048884EAD791C1CF5FADA53F6BB04460415DA610C2ACD2
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):512
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                  Malicious:false
                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):512
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                  Malicious:false
                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32768
                                                                                                                  Entropy (8bit):1.5164935908667418
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:LwZuUJvcFXO3T5XUky/NsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOo:0Z4qTZtsNsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:C0038655D7AE5DE8D232EE6D2EB25258
                                                                                                                  SHA1:BCEFEB5D89A84E055E3AD260D195CEAC2316ECE9
                                                                                                                  SHA-256:494947D770B1B79320DEA0D647F8D52ABDD30779CC38F796F8AE002A2E886684
                                                                                                                  SHA-512:0A859F4B56F269F1124738A7E71BE5AF419D17E72351686852FD0BB6F2FF34A26228F68C5C17FAD4E4048884EAD791C1CF5FADA53F6BB04460415DA610C2ACD2
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32768
                                                                                                                  Entropy (8bit):1.5164935908667418
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:LwZuUJvcFXO3T5XUky/NsSKdgfdguOdghRXdgkdgpdgKdgt6Adga2SBwdgfdguOo:0Z4qTZtsNsUGkOzs9t4rqvGkOzs9Hf
                                                                                                                  MD5:C0038655D7AE5DE8D232EE6D2EB25258
                                                                                                                  SHA1:BCEFEB5D89A84E055E3AD260D195CEAC2316ECE9
                                                                                                                  SHA-256:494947D770B1B79320DEA0D647F8D52ABDD30779CC38F796F8AE002A2E886684
                                                                                                                  SHA-512:0A859F4B56F269F1124738A7E71BE5AF419D17E72351686852FD0BB6F2FF34A26228F68C5C17FAD4E4048884EAD791C1CF5FADA53F6BB04460415DA610C2ACD2
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32768
                                                                                                                  Entropy (8bit):0.06843743119485104
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOZft07x6qkWrkoVky6l0t/:2F0i8n0itFzDHF5t07x6uC01
                                                                                                                  MD5:B23A8F32998499DA774A3479193D91FB
                                                                                                                  SHA1:0FE95AAD29FA238A9488C7C9BF7E1E265A18497B
                                                                                                                  SHA-256:3272D0750CE59B4FF12F23F507659A50D8EC4C4562130BD41A529780E660C33D
                                                                                                                  SHA-512:DBF24A27950DB9528F76E5FCD10F74518083DBBEBB583EA4CDD4295B3122B16640F7AA9C5E3D27DF38E2B0B40E89FF575FA3BBAF249FC0DBB25A4CAA9F7FB30E
                                                                                                                  Malicious:false
                                                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):512
                                                                                                                  Entropy (8bit):0.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3::
                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                  Malicious:false
                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\442.docx.exe
                                                                                                                  File Type:Microsoft Word 2007+
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):230038
                                                                                                                  Entropy (8bit):7.636957641054668
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:nzyKKhARKP6+FeRJhaigk8Ukyhxv8vyNrwyJN2EiXo4EaCNSltkprZvyYqZtGVVu:nzyKKhEKBSf/vv8vyNjz9oltkyYzcZ
                                                                                                                  MD5:773D2787D661474A840B907C8A22D4E9
                                                                                                                  SHA1:A6A0E3C4AB4063BC74C65D6EC0CB43B67F1D767F
                                                                                                                  SHA-256:BA82FE356B21118D92B04A74EF8466A59F4802FD9B061F6E9A28E16CF7A5A8B3
                                                                                                                  SHA-512:7EC868F9B7B47A757BBB5ABF5639F97C47D79AC55DD07954F3EEE93384B555F7C4C817B687C8C486DC97F4174A8CC04DEED342E8ADD6EA2EDB5EE381FC612BEA
                                                                                                                  Malicious:false
                                                                                                                  Preview:PK..........!..A..f...T.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................n.0.E........tQUUH.},.HM?...../....;@..(..I6H0s.=.xF..V..|...d..H..[!M....[.H....LY.9.B ....h.u..T...E......Y.....z."...:..X..~0x...&... ....l.b.......$.Mc....+..@.j<.p.a.).Y.:].q@..2T.=a!].........}...R@2e>.3.]tm....Fev....-...Wn.[.!.w.*k+.I.....q. \.....Qp...s/...W..c..R`...\....xj.....mNEb..[.p.....?..:...(O.um"Z.=.T.@.8.M.8........PK..........!.........N......._rels/.rels ...(...........................
                                                                                                                  Process:C:\Users\user\Desktop\442.docx.exe
                                                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: RMS - Host 7.2, Comments: This installer contains the logic and data to install RMS - Host 7.2, Keywords: Installer,MSI,Database, Subject: RMS - Host 7.2, Author: TektonIT, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Thu Jul 18 02:24:09 2024, Create Time/Date: Thu Jul 18 02:24:09 2024, Last Printed: Thu Jul 18 02:24:09 2024, Revision Number: {134AA6F2-2A49-44F2-A7A5-B7B9233956FA}, Code page: 1251, Template: Intel;1049
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):26864640
                                                                                                                  Entropy (8bit):7.924911310016854
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:393216:3fWbJGFHH0km5pmwUs1211e50MRZDzPHPRn9xrUVaWILZPLM4ShshVK6KZ478Qic:3fRLmf21sq8P50dILZPLzVK6D
                                                                                                                  MD5:24F15E659ECB67862F4C6E72726BFCA7
                                                                                                                  SHA1:75D90172D7A315A31A484629DC8573367F3E544A
                                                                                                                  SHA-256:F11C06F1FD567E26FB4CE9999749516B6E47ADE4EE0B7B875A75A5CBFB74DC04
                                                                                                                  SHA-512:913C9FB7FDCA7F9F7DD7077C34092E76E42D88802406C9A5F6E8AA0C21E4F21FEE850A39B95982EFE9ED4A2D022A95C30739CC20DC65F3C6722B6022D8F76B3C
                                                                                                                  Malicious:false
                                                                                                                  Preview:......................>...................................8........6........................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5..........;................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...A...M...:...<.......=.......?...@...T...B...C...D...E...F...G...H...I...J...O...L...N...n.......P...Q...R...U...........Z...W...X...Y.......[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):162
                                                                                                                  Entropy (8bit):4.634028566518496
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:t4qKF0n4ejBl4XRre0HmzF/gb/j+RcClaaatO:JK+4ejBlYRreAmdgbL+waaM
                                                                                                                  MD5:AE0D713FA3E97CE94286AA2DC08A43DE
                                                                                                                  SHA1:A895E451E04FBF694318A08DEA7881AB901F3264
                                                                                                                  SHA-256:C3D39C0EA20BFF4B0AF08EDA8F81A35201773151B83C7A5632720BDEE8BF7C25
                                                                                                                  SHA-512:C9803D75558E275B477749AAF83ECA777D5C8B071032AC03E8A4812CA8BB63CEB42087C257FFD66D5E5EE65936FE9C88BFD892E28FB40D242D40118413DA7EAA
                                                                                                                  Malicious:false
                                                                                                                  Preview:..........................................................m......6..o......Y]lW..R.KIY..R.+k.m.Yv2.}...Ou{=.W.^m.7E}'...C..EyE......."....}.j.....T...=`j
                                                                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                  Entropy (8bit):7.998140922332344
                                                                                                                  TrID:
                                                                                                                  • Win64 Executable GUI (202006/5) 92.65%
                                                                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                  File name:442.docx.exe
                                                                                                                  File size:25'141'051 bytes
                                                                                                                  MD5:fb8117b1a3f0924100fbc209dbbb1bb1
                                                                                                                  SHA1:9d18c954eae8e8f8437d4e32d0b685f3f51b982b
                                                                                                                  SHA256:beaa1498a67bab02bc4c08f00bde36489aaa86ad8b01ee70b477452a08d360ec
                                                                                                                  SHA512:fcaba4304f26eefa476202e17ca85c3f994d2086f78fa86f1d73f7d6c926825a4ac3b02ceae2d8cde3583f02fdbf87139741035368f6d4b77c4f8c790df330fd
                                                                                                                  SSDEEP:393216:bnD8YsCFVxnq/mIhNAl2543UCCCQrTTNi5NRmclImNm/U29ieL:bgYlFV8/1AbOrXNihH29LL
                                                                                                                  TLSH:14473325EE400AB1E2FAD47098159413D63C3C5DC228B2A722F997287FF7B755B67388
                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                                                  Icon Hash:0b03084c4e4e0383
                                                                                                                  Entrypoint:0x140032ee0
                                                                                                                  Entrypoint Section:.text
                                                                                                                  Digitally signed:false
                                                                                                                  Imagebase:0x140000000
                                                                                                                  Subsystem:windows gui
                                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                                  Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                                                  TLS Callbacks:
                                                                                                                  CLR (.Net) Version:
                                                                                                                  OS Version Major:5
                                                                                                                  OS Version Minor:2
                                                                                                                  File Version Major:5
                                                                                                                  File Version Minor:2
                                                                                                                  Subsystem Version Major:5
                                                                                                                  Subsystem Version Minor:2
                                                                                                                  Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                                                  Instruction
                                                                                                                  dec eax
                                                                                                                  sub esp, 28h
                                                                                                                  call 00007F7774E9F8B8h
                                                                                                                  dec eax
                                                                                                                  add esp, 28h
                                                                                                                  jmp 00007F7774E9F24Fh
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  dec eax
                                                                                                                  mov eax, esp
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [eax+08h], ebx
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [eax+10h], ebp
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [eax+18h], esi
                                                                                                                  dec eax
                                                                                                                  mov dword ptr [eax+20h], edi
                                                                                                                  inc ecx
                                                                                                                  push esi
                                                                                                                  dec eax
                                                                                                                  sub esp, 20h
                                                                                                                  dec ebp
                                                                                                                  mov edx, dword ptr [ecx+38h]
                                                                                                                  dec eax
                                                                                                                  mov esi, edx
                                                                                                                  dec ebp
                                                                                                                  mov esi, eax
                                                                                                                  dec eax
                                                                                                                  mov ebp, ecx
                                                                                                                  dec ecx
                                                                                                                  mov edx, ecx
                                                                                                                  dec eax
                                                                                                                  mov ecx, esi
                                                                                                                  dec ecx
                                                                                                                  mov edi, ecx
                                                                                                                  inc ecx
                                                                                                                  mov ebx, dword ptr [edx]
                                                                                                                  dec eax
                                                                                                                  shl ebx, 04h
                                                                                                                  dec ecx
                                                                                                                  add ebx, edx
                                                                                                                  dec esp
                                                                                                                  lea eax, dword ptr [ebx+04h]
                                                                                                                  call 00007F7774E9E6D3h
                                                                                                                  mov eax, dword ptr [ebp+04h]
                                                                                                                  and al, 66h
                                                                                                                  neg al
                                                                                                                  mov eax, 00000001h
                                                                                                                  sbb edx, edx
                                                                                                                  neg edx
                                                                                                                  add edx, eax
                                                                                                                  test dword ptr [ebx+04h], edx
                                                                                                                  je 00007F7774E9F3E3h
                                                                                                                  dec esp
                                                                                                                  mov ecx, edi
                                                                                                                  dec ebp
                                                                                                                  mov eax, esi
                                                                                                                  dec eax
                                                                                                                  mov edx, esi
                                                                                                                  dec eax
                                                                                                                  mov ecx, ebp
                                                                                                                  call 00007F7774EA13F7h
                                                                                                                  dec eax
                                                                                                                  mov ebx, dword ptr [esp+30h]
                                                                                                                  dec eax
                                                                                                                  mov ebp, dword ptr [esp+38h]
                                                                                                                  dec eax
                                                                                                                  mov esi, dword ptr [esp+40h]
                                                                                                                  dec eax
                                                                                                                  mov edi, dword ptr [esp+48h]
                                                                                                                  dec eax
                                                                                                                  add esp, 20h
                                                                                                                  inc ecx
                                                                                                                  pop esi
                                                                                                                  ret
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  dec eax
                                                                                                                  sub esp, 48h
                                                                                                                  dec eax
                                                                                                                  lea ecx, dword ptr [esp+20h]
                                                                                                                  call 00007F7774E8DC63h
                                                                                                                  dec eax
                                                                                                                  lea edx, dword ptr [00025747h]
                                                                                                                  dec eax
                                                                                                                  lea ecx, dword ptr [esp+20h]
                                                                                                                  call 00007F7774EA04B2h
                                                                                                                  int3
                                                                                                                  jmp 00007F7774EA6694h
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  int3
                                                                                                                  Programming Language:
                                                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x1558c.rsrc
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x970.reloc
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                  .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                  .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .rsrc0x700000x1558c0x1560050f0a4d841d0856138dbb9d7187108bfFalse0.1905953033625731data5.443581422941128IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                  .reloc0x860000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                  PNG0x705540xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                                                  PNG0x7109c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                                                  RT_ICON0x726480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 15118 x 15118 px/m0.06374955637051934
                                                                                                                  RT_DIALOG0x82e700x2badata0.5286532951289399
                                                                                                                  RT_DIALOG0x8312c0x13adata0.6560509554140127
                                                                                                                  RT_DIALOG0x832680xf2data0.71900826446281
                                                                                                                  RT_DIALOG0x8335c0x14adata0.6
                                                                                                                  RT_DIALOG0x834a80x314data0.47588832487309646
                                                                                                                  RT_DIALOG0x837bc0x24adata0.6279863481228669
                                                                                                                  RT_STRING0x83a080x1fcdata0.421259842519685
                                                                                                                  RT_STRING0x83c040x246data0.41924398625429554
                                                                                                                  RT_STRING0x83e4c0x1a6data0.514218009478673
                                                                                                                  RT_STRING0x83ff40xdcdata0.65
                                                                                                                  RT_STRING0x840d00x470data0.3873239436619718
                                                                                                                  RT_STRING0x845400x164data0.5056179775280899
                                                                                                                  RT_STRING0x846a40x110data0.5772058823529411
                                                                                                                  RT_STRING0x847b40x158data0.4563953488372093
                                                                                                                  RT_STRING0x8490c0xe8data0.5948275862068966
                                                                                                                  RT_STRING0x849f40x1c6data0.5242290748898678
                                                                                                                  RT_STRING0x84bbc0x268data0.4837662337662338
                                                                                                                  RT_GROUP_ICON0x84e240x14data1.15
                                                                                                                  RT_MANIFEST0x84e380x753XML 1.0 document, ASCII text, with CRLF line terminators0.39786666666666665
                                                                                                                  DLLImport
                                                                                                                  KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                                                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                                                  gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                  2024-12-03T12:48:20.628368+01002849354ETPRO MALWARE Remote Admin Backdoor Related Activity1192.168.2.449873111.90.147.12580TCP
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Dec 3, 2024 12:47:25.151310921 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:25.272533894 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:25.274496078 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:25.278033018 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:25.278065920 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:25.397968054 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:25.398150921 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:25.398315907 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:28.386300087 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:28.437257051 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:28.472431898 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:28.593050957 CET56554980695.213.205.83192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:28.593106031 CET498065655192.168.2.495.213.205.83
                                                                                                                  Dec 3, 2024 12:47:28.798655033 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:47:28.918790102 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:28.918874025 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:47:28.919806004 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:47:28.919910908 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:47:29.039983034 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:29.039999962 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:29.040036917 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:57.524679899 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:47:57.577951908 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:48:18.859935045 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.860985041 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.864202023 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.865351915 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.865639925 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.866728067 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.980422974 CET46549870111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.980516911 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.981054068 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.981076002 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.981492996 CET565149871111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.981563091 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.982074022 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.982089043 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.984752893 CET5555549872111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.984813929 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.985318899 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.985332966 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.985867977 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.985913992 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.986030102 CET56514987478.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.986085892 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.986464024 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.986479044 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:18.986545086 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.986561060 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.987034082 CET80804987578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:18.987082005 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.987467051 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:18.987488985 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:19.101052046 CET46549870111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.101063013 CET46549870111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.101952076 CET565149871111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.101958990 CET565149871111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.105441093 CET5555549872111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.105448961 CET5555549872111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.106424093 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.106468916 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.106477022 CET56514987478.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.106493950 CET56514987478.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.107348919 CET80804987578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:19.107364893 CET80804987578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.628106117 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.628274918 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:20.628309965 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:20.628328085 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:20.628346920 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:20.628367901 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:20.749510050 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.749521017 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.749560118 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.749568939 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:20.749576092 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:21.465563059 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:21.515513897 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:21.618267059 CET5555549872111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:21.618726969 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:21.618794918 CET4987255555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:21.645543098 CET565149871111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:21.645606041 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:21.645677090 CET498715651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:21.738769054 CET5555549872111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:21.765778065 CET565149871111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:22.469597101 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:22.517391920 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:23.484899998 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:23.531146049 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:24.514514923 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:24.562436104 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:25.501291037 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:25.546819925 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:26.516609907 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:26.562498093 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:27.519820929 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:27.562378883 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:28.531864882 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:28.578003883 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:28.583981991 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:28.640533924 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:48:29.547425032 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:29.593766928 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:30.563323021 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:30.609276056 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:31.563493013 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:31.609278917 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:32.578844070 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:32.624964952 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:33.594439030 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:33.640573978 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:33.985043049 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:34.000432014 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:34.000592947 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:34.148509026 CET46549870111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:34.168448925 CET80804987578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:34.168492079 CET56514987478.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:34.610203028 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:34.656290054 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:35.625579119 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:35.671787977 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:36.625951052 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:36.671775103 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:37.664952040 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:37.718661070 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:38.657680988 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:38.703062057 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:39.672827959 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:39.718694925 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:40.688280106 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:40.734389067 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:40.922863007 CET80804987578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:40.922938108 CET498758080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:40.923064947 CET56514987478.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:40.923109055 CET498745651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:48:40.947629929 CET46549870111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:40.947688103 CET49870465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:41.704114914 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:41.749943018 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:42.719583988 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:42.765577078 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:43.735340118 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:43.781156063 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:44.750711918 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:44.796941042 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:45.766261101 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:45.812485933 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:46.781950951 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:46.828136921 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:47.782299042 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:47.828047991 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:48.797636032 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:48.843799114 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:49.813033104 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:49.859337091 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:50.829871893 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:50.874988079 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:51.845088005 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:51.890564919 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:52.859702110 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:52.906188965 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:53.860264063 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:53.906295061 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:54.881376028 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:54.937457085 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:55.894876957 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:55.953347921 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:56.906825066 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:56.953068018 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:57.923914909 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:57.968699932 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:58.938452005 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:58.984359026 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:48:59.954694033 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:48:59.999954939 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:00.680799961 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:00.734385967 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:49:00.972513914 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:01.015609980 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:01.974072933 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:02.015649080 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:02.984832048 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:03.031224966 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:04.000684977 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:04.046838999 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:05.018739939 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:05.062491894 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:06.032336950 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:06.078315020 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:07.047650099 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:07.093864918 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:08.063457012 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:08.109344959 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:09.078840971 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:09.124965906 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:10.080544949 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:10.124994040 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:11.094476938 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:11.140595913 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:12.109952927 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:12.156243086 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:13.125694990 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:13.171948910 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:14.141441107 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:14.187490940 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:15.157902002 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:15.203200102 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:16.173125982 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:16.218911886 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:17.188031912 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:17.234389067 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.203852892 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:18.250016928 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.873682022 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.874320030 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.878911018 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.879354954 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.893954039 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.993782997 CET56515000278.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:18.993911982 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.994275093 CET46550003111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:18.994452953 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.994533062 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.994554043 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.995029926 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.995054960 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.998851061 CET5555550004111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:18.998917103 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.999244928 CET80805000578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:18.999311924 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.999471903 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.999495029 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:18.999773979 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:18.999785900 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:19.013926029 CET565150006111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.013995886 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:19.014477968 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:19.014565945 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:19.114450932 CET56515000278.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.114463091 CET56515000278.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.115071058 CET46550003111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.115078926 CET46550003111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.119533062 CET5555550004111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.119659901 CET5555550004111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.119671106 CET80805000578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.119678974 CET80805000578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.135252953 CET565150006111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.135307074 CET565150006111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.219476938 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:19.265634060 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:20.286286116 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:20.328279972 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.250664949 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:21.296919107 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.624634981 CET5555550004111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:21.624835014 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.624898911 CET5000455555192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.639352083 CET565150006111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:21.639467955 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.639559031 CET500065651192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:21.745201111 CET5555550004111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:21.759752035 CET565150006111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:22.266110897 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:22.312587023 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:23.282043934 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:23.328130007 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:24.297909975 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:24.343874931 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:25.313196898 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:25.359488010 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:26.328849077 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:26.375323057 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:27.344129086 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:27.390651941 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:28.344773054 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:28.390638113 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:29.360161066 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:29.406372070 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:30.375893116 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:30.421968937 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:31.391205072 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:31.437526941 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:32.407150030 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:32.453155041 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:33.175115108 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:33.218777895 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:49:33.422342062 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:33.468813896 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:34.000785112 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:34.001229048 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:34.001230001 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:34.168948889 CET56515000278.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:34.168970108 CET46550003111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:34.168979883 CET80805000578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:34.438414097 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:34.484421015 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:35.453630924 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:35.500168085 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:36.454144955 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:36.500027895 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:37.469518900 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:37.515670061 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:38.485189915 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:38.531327963 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:39.500507116 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:39.550345898 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:40.516382933 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:40.562561989 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:40.939759970 CET46550003111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:40.939781904 CET80805000578.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:40.939851999 CET50003465192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:40.939871073 CET500058080192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:40.948777914 CET56515000278.138.9.142192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:40.950961113 CET500025651192.168.2.478.138.9.142
                                                                                                                  Dec 3, 2024 12:49:41.532510042 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:41.578394890 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:42.547652006 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:42.593792915 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:43.563409090 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:43.609527111 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:44.565674067 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:44.609421015 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:45.578802109 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:45.625406027 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:46.594400883 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:46.640691042 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:47.610302925 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:47.656307936 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:48.625579119 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:48.671962976 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:49.641405106 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:49.690237999 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:50.660056114 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:50.703196049 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:51.672738075 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:51.718839884 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:52.688344955 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:52.734435081 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:53.704380035 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:53.752608061 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:54.719506979 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:54.765687943 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:55.735133886 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:55.781338930 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:56.750689983 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:56.796947956 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:57.766731024 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:57.812577009 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:58.782044888 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:58.828191996 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:49:59.797655106 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:49:59.843908072 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:00.814228058 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:00.859458923 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:01.828840971 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:01.875318050 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:02.844851971 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:02.890698910 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:03.368840933 CET565549809109.234.156.179192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:03.421957970 CET498095655192.168.2.4109.234.156.179
                                                                                                                  Dec 3, 2024 12:50:03.860003948 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:03.906361103 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:04.860327959 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:04.906369925 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:05.883447886 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:05.937577963 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:06.891153097 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:06.937674046 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:07.891299009 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:07.937578917 CET4987380192.168.2.4111.90.147.125
                                                                                                                  Dec 3, 2024 12:50:08.907347918 CET8049873111.90.147.125192.168.2.4
                                                                                                                  Dec 3, 2024 12:50:08.953255892 CET4987380192.168.2.4111.90.147.125
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Dec 3, 2024 12:47:24.735080004 CET5380953192.168.2.41.1.1.1
                                                                                                                  Dec 3, 2024 12:47:25.149568081 CET53538091.1.1.1192.168.2.4
                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                  Dec 3, 2024 12:47:24.735080004 CET192.168.2.41.1.1.10xd074Standard query (0)id72.internetid.ruA (IP address)IN (0x0001)false
                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.208.103A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.208.71A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.208.99A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.211.37A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.59.37A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.211.39A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.211.35A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:07.237148046 CET1.1.1.1192.168.2.40xb7f5No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.56.102A (IP address)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:17.780982971 CET1.1.1.1192.168.2.40x6f02No error (0)templatesmetadata.office.nettemplatesmetadata.office.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:25.149568081 CET1.1.1.1192.168.2.40xd074No error (0)id72.internetid.rumain.internetid.ruCNAME (Canonical name)IN (0x0001)false
                                                                                                                  Dec 3, 2024 12:47:25.149568081 CET1.1.1.1192.168.2.40xd074No error (0)main.internetid.ru95.213.205.83A (IP address)IN (0x0001)false
                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.449873111.90.147.125807796C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Dec 3, 2024 12:48:18.986464024 CET6OUTData Raw: 00 00 00 07
                                                                                                                  Data Ascii:
                                                                                                                  Dec 3, 2024 12:48:18.986479044 CET6OUTData Raw: 00 00 00 03
                                                                                                                  Data Ascii:
                                                                                                                  Dec 3, 2024 12:48:20.628106117 CET4INData Raw: 00 01 12 7e
                                                                                                                  Data Ascii: ~
                                                                                                                  Dec 3, 2024 12:48:20.628274918 CET6OUTData Raw: 00 01 12 7e
                                                                                                                  Data Ascii: ~
                                                                                                                  Dec 3, 2024 12:48:20.628309965 CET6OUTData Raw: 00 00 00 01
                                                                                                                  Data Ascii:
                                                                                                                  Dec 3, 2024 12:48:20.628328085 CET6OUTData Raw: 2d 2d 0d 0a
                                                                                                                  Data Ascii: --
                                                                                                                  Dec 3, 2024 12:48:20.628346920 CET6OUTData Raw: 00 00 00 2e
                                                                                                                  Data Ascii: .
                                                                                                                  Dec 3, 2024 12:48:20.628367901 CET46OUTData Raw: 22 00 43 00 6f 00 6d 00 70 00 75 00 74 00 65 00 72 00 20 00 6e 00 61 00 6d 00 65 00 3a 00 20 00 39 00 39 00 32 00 35 00 34 00 37 00 22 00
                                                                                                                  Data Ascii: "Computer name: 992547"
                                                                                                                  Dec 3, 2024 12:48:21.465563059 CET4INData Raw: 00 00 00 00
                                                                                                                  Data Ascii:
                                                                                                                  Dec 3, 2024 12:48:22.469597101 CET4INData Raw: 00 00 00 00
                                                                                                                  Data Ascii:


                                                                                                                  Click to jump to process

                                                                                                                  Click to jump to process

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Click to jump to process

                                                                                                                  Target ID:0
                                                                                                                  Start time:06:46:56
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Users\user\Desktop\442.docx.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:"C:\Users\user\Desktop\442.docx.exe"
                                                                                                                  Imagebase:0x7ff7ed6a0000
                                                                                                                  File size:25'141'051 bytes
                                                                                                                  MD5 hash:FB8117B1A3F0924100FBC209DBBB1BB1
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:1
                                                                                                                  Start time:06:46:57
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\intel\Word.msi" /qn
                                                                                                                  Imagebase:0x7ff6b6330000
                                                                                                                  File size:69'632 bytes
                                                                                                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:2
                                                                                                                  Start time:06:46:57
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                                                  Imagebase:0x7ff6b6330000
                                                                                                                  File size:69'632 bytes
                                                                                                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:false

                                                                                                                  Target ID:3
                                                                                                                  Start time:06:46:57
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\intel\Doc.docx" /o ""
                                                                                                                  Imagebase:0x700000
                                                                                                                  File size:1'620'872 bytes
                                                                                                                  MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:false

                                                                                                                  Target ID:4
                                                                                                                  Start time:06:46:59
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 3A7D5E944AD6C6FD24895B2767E40451
                                                                                                                  Imagebase:0xe60000
                                                                                                                  File size:59'904 bytes
                                                                                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:5
                                                                                                                  Start time:06:47:01
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                  Imagebase:0x7ff6eef20000
                                                                                                                  File size:55'320 bytes
                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:9
                                                                                                                  Start time:06:47:06
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" -msi_copy "C:\intel\Word.msi"
                                                                                                                  Imagebase:0x310000
                                                                                                                  File size:11'132'168 bytes
                                                                                                                  MD5 hash:CB9BE257064162076EBD4869CD97E166
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000009.00000000.1818406969.0000000000DC5000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, Author: Joe Security
                                                                                                                  • Rule: MALWARE_Win_RemoteUtilitiesRAT, Description: RemoteUtilitiesRAT RAT payload, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe, Author: ditekSHen
                                                                                                                  Antivirus matches:
                                                                                                                  • Detection: 13%, ReversingLabs
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:10
                                                                                                                  Start time:06:47:09
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall
                                                                                                                  Imagebase:0x820000
                                                                                                                  File size:21'764'872 bytes
                                                                                                                  MD5 hash:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 0000000A.00000000.1856486408.0000000001CE1000.00000002.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, Author: Joe Security
                                                                                                                  • Rule: MALWARE_Win_RemoteUtilitiesRAT, Description: RemoteUtilitiesRAT RAT payload, Source: C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe, Author: ditekSHen
                                                                                                                  Antivirus matches:
                                                                                                                  • Detection: 12%, ReversingLabs
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:12
                                                                                                                  Start time:06:47:14
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall
                                                                                                                  Imagebase:0x820000
                                                                                                                  File size:21'764'872 bytes
                                                                                                                  MD5 hash:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Reputation:low
                                                                                                                  Has exited:true

                                                                                                                  Target ID:15
                                                                                                                  Start time:06:47:16
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /start
                                                                                                                  Imagebase:0x820000
                                                                                                                  File size:21'764'872 bytes
                                                                                                                  MD5 hash:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Has exited:true

                                                                                                                  Target ID:16
                                                                                                                  Start time:06:47:17
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -service
                                                                                                                  Imagebase:0x820000
                                                                                                                  File size:21'764'872 bytes
                                                                                                                  MD5 hash:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000010.00000002.3578675457.0000000002B18000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000010.00000003.1936056705.0000000006601000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Has exited:false

                                                                                                                  Target ID:17
                                                                                                                  Start time:06:47:18
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"
                                                                                                                  Imagebase:0x310000
                                                                                                                  File size:11'132'168 bytes
                                                                                                                  MD5 hash:CB9BE257064162076EBD4869CD97E166
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000011.00000002.3572801729.00000000017DA000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000011.00000002.3572801729.00000000017B6000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Has exited:false

                                                                                                                  Target ID:18
                                                                                                                  Start time:06:47:18
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                                                                                                                  Imagebase:0x310000
                                                                                                                  File size:11'132'168 bytes
                                                                                                                  MD5 hash:CB9BE257064162076EBD4869CD97E166
                                                                                                                  Has elevated privileges:false
                                                                                                                  Has administrator privileges:false
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000012.00000002.3573808248.000000000314A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000012.00000002.3573808248.0000000003118000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000012.00000002.3579027400.0000000004B64000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_RMSRemoteAdmin, Description: Yara detected RMS RemoteAdmin tool, Source: 00000012.00000002.3579027400.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Has exited:false

                                                                                                                  Target ID:19
                                                                                                                  Start time:06:47:26
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray
                                                                                                                  Imagebase:0x310000
                                                                                                                  File size:11'132'168 bytes
                                                                                                                  MD5 hash:CB9BE257064162076EBD4869CD97E166
                                                                                                                  Has elevated privileges:false
                                                                                                                  Has administrator privileges:false
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Has exited:true

                                                                                                                  Target ID:20
                                                                                                                  Start time:06:48:08
                                                                                                                  Start date:03/12/2024
                                                                                                                  Path:C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" -firewall
                                                                                                                  Imagebase:0x820000
                                                                                                                  File size:21'764'872 bytes
                                                                                                                  MD5 hash:D563A4D6BFCFE6884D1AC88824CB5C2A
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:Borland Delphi
                                                                                                                  Has exited:true

                                                                                                                  Reset < >

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:11.8%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:26.1%
                                                                                                                    Total number of Nodes:2000
                                                                                                                    Total number of Limit Nodes:26
                                                                                                                    execution_graph 25910 7ff7ed6cb190 26253 7ff7ed6a255c 25910->26253 25912 7ff7ed6cb1db 25913 7ff7ed6cbe93 25912->25913 25914 7ff7ed6cb1ef 25912->25914 25962 7ff7ed6cb20c 25912->25962 26538 7ff7ed6cf390 25913->26538 25917 7ff7ed6cb1ff 25914->25917 25918 7ff7ed6cb2db 25914->25918 25914->25962 25922 7ff7ed6cb207 25917->25922 25923 7ff7ed6cb2a9 25917->25923 25925 7ff7ed6cb391 25918->25925 25930 7ff7ed6cb2f5 25918->25930 25920 7ff7ed6cbec9 25927 7ff7ed6cbed5 SendDlgItemMessageW 25920->25927 25928 7ff7ed6cbef0 GetDlgItem SendMessageW 25920->25928 25921 7ff7ed6cbeba SendMessageW 25921->25920 25933 7ff7ed6baae0 48 API calls 25922->25933 25922->25962 25929 7ff7ed6cb2cb EndDialog 25923->25929 25923->25962 26261 7ff7ed6a22bc GetDlgItem 25925->26261 25927->25928 26557 7ff7ed6b62dc GetCurrentDirectoryW 25928->26557 25929->25962 25934 7ff7ed6baae0 48 API calls 25930->25934 25937 7ff7ed6cb236 25933->25937 25938 7ff7ed6cb313 SetDlgItemTextW 25934->25938 25935 7ff7ed6cb3b1 EndDialog 26114 7ff7ed6cb3da 25935->26114 25936 7ff7ed6cbf47 GetDlgItem 26567 7ff7ed6a2520 25936->26567 26571 7ff7ed6a1ec4 34 API calls _handle_error 25937->26571 25942 7ff7ed6cb326 25938->25942 25941 7ff7ed6cb408 GetDlgItem 25946 7ff7ed6cb44f SetFocus 25941->25946 25947 7ff7ed6cb422 SendMessageW SendMessageW 25941->25947 25948 7ff7ed6cb340 GetMessageW 25942->25948 25942->25962 25945 7ff7ed6cb246 25952 7ff7ed6cb25c 25945->25952 26572 7ff7ed6a250c 25945->26572 25949 7ff7ed6cb465 25946->25949 25950 7ff7ed6cb4f2 25946->25950 25947->25946 25954 7ff7ed6cb35e IsDialogMessageW 25948->25954 25948->25962 25955 7ff7ed6baae0 48 API calls 25949->25955 26275 7ff7ed6a8d04 25950->26275 25952->25962 25967 7ff7ed6cc363 25952->25967 25954->25942 25961 7ff7ed6cb373 TranslateMessage DispatchMessageW 25954->25961 25963 7ff7ed6cb46f 25955->25963 25956 7ff7ed6cbcc5 25964 7ff7ed6baae0 48 API calls 25956->25964 25957 7ff7ed6a1fa0 31 API calls 25957->25962 25960 7ff7ed6cb52c 26285 7ff7ed6cef80 25960->26285 25961->25942 26623 7ff7ed6d2320 25962->26623 26575 7ff7ed6a129c 25963->26575 25968 7ff7ed6cbcd6 SetDlgItemTextW 25964->25968 26632 7ff7ed6d7904 25967->26632 25972 7ff7ed6baae0 48 API calls 25968->25972 25978 7ff7ed6cbd08 25972->25978 25994 7ff7ed6a129c 33 API calls 25978->25994 25979 7ff7ed6cc368 25989 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 25979->25989 25982 7ff7ed6cb498 25987 7ff7ed6cf0a4 24 API calls 25982->25987 25992 7ff7ed6cb4a5 25987->25992 25995 7ff7ed6cc36e 25989->25995 25992->25979 26002 7ff7ed6cb4e8 25992->26002 26001 7ff7ed6cbd31 25994->26001 26009 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 25995->26009 26008 7ff7ed6cbdda 26001->26008 26034 7ff7ed6a129c 33 API calls 26001->26034 26029 7ff7ed6cb5ec 26002->26029 26585 7ff7ed6cfa80 33 API calls 2 library calls 26002->26585 26016 7ff7ed6baae0 48 API calls 26008->26016 26017 7ff7ed6cc374 26009->26017 26012 7ff7ed6a1fa0 31 API calls 26027 7ff7ed6cb586 26012->26027 26032 7ff7ed6cbde4 26016->26032 26025 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26017->26025 26023 7ff7ed6cb61a 26323 7ff7ed6b2f58 26023->26323 26033 7ff7ed6cc37a 26025->26033 26027->25995 26027->26002 26029->26023 26586 7ff7ed6b32a8 26029->26586 26038 7ff7ed6a129c 33 API calls 26032->26038 26045 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26033->26045 26039 7ff7ed6cbd7f 26034->26039 26044 7ff7ed6cbe0d 26038->26044 26047 7ff7ed6baae0 48 API calls 26039->26047 26042 7ff7ed6cb634 GetLastError 26043 7ff7ed6cb64c 26042->26043 26335 7ff7ed6b7fc4 26043->26335 26061 7ff7ed6a129c 33 API calls 26044->26061 26051 7ff7ed6cc380 26045->26051 26052 7ff7ed6cbd8a 26047->26052 26049 7ff7ed6cb60e 26589 7ff7ed6c9d90 12 API calls _handle_error 26049->26589 26062 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26051->26062 26057 7ff7ed6a1150 33 API calls 26052->26057 26055 7ff7ed6cb65e 26059 7ff7ed6cb674 26055->26059 26060 7ff7ed6cb665 GetLastError 26055->26060 26063 7ff7ed6cbda2 26057->26063 26065 7ff7ed6cb71c 26059->26065 26069 7ff7ed6cb72b 26059->26069 26070 7ff7ed6cb68b GetTickCount 26059->26070 26060->26059 26066 7ff7ed6cbe4e 26061->26066 26067 7ff7ed6cc386 26062->26067 26619 7ff7ed6a2034 26063->26619 26065->26069 26085 7ff7ed6cbb79 26065->26085 26078 7ff7ed6a1fa0 31 API calls 26066->26078 26071 7ff7ed6a255c 61 API calls 26067->26071 26075 7ff7ed6cba50 26069->26075 26590 7ff7ed6b6454 26069->26590 26338 7ff7ed6a4228 26070->26338 26074 7ff7ed6cc3e4 26071->26074 26079 7ff7ed6cc3e8 26074->26079 26088 7ff7ed6cc489 GetDlgItem SetFocus 26074->26088 26116 7ff7ed6cc3fd 26074->26116 26075->25935 26614 7ff7ed6abd0c 33 API calls 26075->26614 26076 7ff7ed6cbdbe 26083 7ff7ed6a1fa0 31 API calls 26076->26083 26086 7ff7ed6cbe78 26078->26086 26094 7ff7ed6d2320 _handle_error 8 API calls 26079->26094 26090 7ff7ed6cbdcc 26083->26090 26100 7ff7ed6baae0 48 API calls 26085->26100 26092 7ff7ed6a1fa0 31 API calls 26086->26092 26087 7ff7ed6cba75 26615 7ff7ed6a1150 26087->26615 26098 7ff7ed6cc4ba 26088->26098 26089 7ff7ed6cb74e 26602 7ff7ed6bb914 102 API calls 26089->26602 26097 7ff7ed6a1fa0 31 API calls 26090->26097 26091 7ff7ed6cb6ba 26348 7ff7ed6a1fa0 26091->26348 26101 7ff7ed6cbe83 26092->26101 26103 7ff7ed6cca97 26094->26103 26097->26008 26105 7ff7ed6a129c 33 API calls 26098->26105 26107 7ff7ed6cbba7 SetDlgItemTextW 26100->26107 26108 7ff7ed6a1fa0 31 API calls 26101->26108 26102 7ff7ed6cba8a 26109 7ff7ed6baae0 48 API calls 26102->26109 26104 7ff7ed6cb768 26111 7ff7ed6bda98 48 API calls 26104->26111 26112 7ff7ed6cc4cc 26105->26112 26106 7ff7ed6cb6c8 26353 7ff7ed6b2134 26106->26353 26113 7ff7ed6a2534 26107->26113 26108->26114 26115 7ff7ed6cba97 26109->26115 26110 7ff7ed6cc434 SendDlgItemMessageW 26117 7ff7ed6cc454 26110->26117 26118 7ff7ed6cc45d EndDialog 26110->26118 26119 7ff7ed6cb7aa GetCommandLineW 26111->26119 26637 7ff7ed6b80d8 33 API calls 26112->26637 26123 7ff7ed6cbbc5 SetDlgItemTextW GetDlgItem 26113->26123 26114->25957 26124 7ff7ed6a1150 33 API calls 26115->26124 26116->26079 26116->26110 26117->26118 26118->26079 26120 7ff7ed6cb84f 26119->26120 26121 7ff7ed6cb869 26119->26121 26603 7ff7ed6a20b0 26120->26603 26607 7ff7ed6cab54 33 API calls _handle_error 26121->26607 26128 7ff7ed6cbc13 26123->26128 26129 7ff7ed6cbbf0 GetWindowLongPtrW SetWindowLongPtrW 26123->26129 26130 7ff7ed6cbaaa 26124->26130 26125 7ff7ed6cc4e0 26131 7ff7ed6a250c SetDlgItemTextW 26125->26131 26373 7ff7ed6cce88 26128->26373 26129->26128 26135 7ff7ed6a1fa0 31 API calls 26130->26135 26137 7ff7ed6cc4f4 26131->26137 26132 7ff7ed6cb87a 26608 7ff7ed6cab54 33 API calls _handle_error 26132->26608 26142 7ff7ed6cbab5 26135->26142 26147 7ff7ed6cc526 SendDlgItemMessageW FindFirstFileW 26137->26147 26139 7ff7ed6cb704 26369 7ff7ed6b204c 26139->26369 26140 7ff7ed6cb6f5 GetLastError 26140->26139 26146 7ff7ed6a1fa0 31 API calls 26142->26146 26143 7ff7ed6cb88b 26609 7ff7ed6cab54 33 API calls _handle_error 26143->26609 26145 7ff7ed6cce88 160 API calls 26150 7ff7ed6cbc3c 26145->26150 26151 7ff7ed6cbac3 26146->26151 26152 7ff7ed6cc57b 26147->26152 26245 7ff7ed6cca04 26147->26245 26523 7ff7ed6cf974 26150->26523 26161 7ff7ed6baae0 48 API calls 26151->26161 26162 7ff7ed6baae0 48 API calls 26152->26162 26153 7ff7ed6cb89c 26610 7ff7ed6bb9b4 102 API calls 26153->26610 26158 7ff7ed6cb8b3 26611 7ff7ed6cfbdc 33 API calls 26158->26611 26159 7ff7ed6cca81 26159->26079 26160 7ff7ed6cce88 160 API calls 26176 7ff7ed6cbc6a 26160->26176 26165 7ff7ed6cbadb 26161->26165 26166 7ff7ed6cc59e 26162->26166 26164 7ff7ed6ccaa9 26168 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26164->26168 26177 7ff7ed6a129c 33 API calls 26165->26177 26178 7ff7ed6a129c 33 API calls 26166->26178 26167 7ff7ed6cb8d2 CreateFileMappingW 26171 7ff7ed6cb953 ShellExecuteExW 26167->26171 26172 7ff7ed6cb911 MapViewOfFile 26167->26172 26173 7ff7ed6ccaae 26168->26173 26169 7ff7ed6cbc96 26537 7ff7ed6a2298 GetDlgItem EnableWindow 26169->26537 26193 7ff7ed6cb974 26171->26193 26612 7ff7ed6d3640 26172->26612 26179 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26173->26179 26174 7ff7ed6cb3f5 26174->25935 26174->25956 26176->26169 26180 7ff7ed6cce88 160 API calls 26176->26180 26185 7ff7ed6cbb04 26177->26185 26181 7ff7ed6cc5cd 26178->26181 26182 7ff7ed6ccab4 26179->26182 26180->26169 26183 7ff7ed6a1150 33 API calls 26181->26183 26188 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26182->26188 26186 7ff7ed6cc5e8 26183->26186 26184 7ff7ed6cbb5a 26189 7ff7ed6a1fa0 31 API calls 26184->26189 26185->26033 26185->26184 26638 7ff7ed6ae164 33 API calls 2 library calls 26186->26638 26187 7ff7ed6cb9c3 26194 7ff7ed6cb9ef 26187->26194 26195 7ff7ed6cb9dc UnmapViewOfFile CloseHandle 26187->26195 26191 7ff7ed6ccaba 26188->26191 26189->25935 26197 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26191->26197 26192 7ff7ed6cc5ff 26198 7ff7ed6a1fa0 31 API calls 26192->26198 26193->26187 26202 7ff7ed6cb9b1 Sleep 26193->26202 26194->26017 26196 7ff7ed6cba25 26194->26196 26195->26194 26200 7ff7ed6a1fa0 31 API calls 26196->26200 26199 7ff7ed6ccac0 26197->26199 26201 7ff7ed6cc60c 26198->26201 26204 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26199->26204 26203 7ff7ed6cba42 26200->26203 26201->26173 26206 7ff7ed6a1fa0 31 API calls 26201->26206 26202->26187 26202->26193 26205 7ff7ed6a1fa0 31 API calls 26203->26205 26207 7ff7ed6ccac6 26204->26207 26205->26075 26208 7ff7ed6cc673 26206->26208 26211 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26207->26211 26209 7ff7ed6a250c SetDlgItemTextW 26208->26209 26210 7ff7ed6cc687 FindClose 26209->26210 26212 7ff7ed6cc6a3 26210->26212 26213 7ff7ed6cc797 SendDlgItemMessageW 26210->26213 26214 7ff7ed6ccacc 26211->26214 26639 7ff7ed6ca2cc 10 API calls _handle_error 26212->26639 26216 7ff7ed6cc7cb 26213->26216 26219 7ff7ed6baae0 48 API calls 26216->26219 26217 7ff7ed6cc6c6 26218 7ff7ed6baae0 48 API calls 26217->26218 26220 7ff7ed6cc6cf 26218->26220 26221 7ff7ed6cc7d8 26219->26221 26222 7ff7ed6bda98 48 API calls 26220->26222 26223 7ff7ed6a129c 33 API calls 26221->26223 26226 7ff7ed6cc6ec memcpy_s 26222->26226 26225 7ff7ed6cc807 26223->26225 26224 7ff7ed6a1fa0 31 API calls 26227 7ff7ed6cc783 26224->26227 26228 7ff7ed6a1150 33 API calls 26225->26228 26226->26182 26226->26224 26229 7ff7ed6a250c SetDlgItemTextW 26227->26229 26230 7ff7ed6cc822 26228->26230 26229->26213 26640 7ff7ed6ae164 33 API calls 2 library calls 26230->26640 26232 7ff7ed6cc839 26233 7ff7ed6a1fa0 31 API calls 26232->26233 26234 7ff7ed6cc845 memcpy_s 26233->26234 26235 7ff7ed6a1fa0 31 API calls 26234->26235 26236 7ff7ed6cc87f 26235->26236 26237 7ff7ed6a1fa0 31 API calls 26236->26237 26238 7ff7ed6cc88c 26237->26238 26238->26191 26239 7ff7ed6a1fa0 31 API calls 26238->26239 26240 7ff7ed6cc8f3 26239->26240 26241 7ff7ed6a250c SetDlgItemTextW 26240->26241 26242 7ff7ed6cc907 26241->26242 26242->26245 26641 7ff7ed6ca2cc 10 API calls _handle_error 26242->26641 26244 7ff7ed6cc932 26246 7ff7ed6baae0 48 API calls 26244->26246 26245->26079 26245->26159 26245->26164 26245->26207 26247 7ff7ed6cc93c 26246->26247 26248 7ff7ed6bda98 48 API calls 26247->26248 26250 7ff7ed6cc959 memcpy_s 26248->26250 26249 7ff7ed6a1fa0 31 API calls 26251 7ff7ed6cc9f0 26249->26251 26250->26199 26250->26249 26252 7ff7ed6a250c SetDlgItemTextW 26251->26252 26252->26245 26254 7ff7ed6a25d0 26253->26254 26255 7ff7ed6a256a 26253->26255 26254->25912 26255->26254 26642 7ff7ed6ba4ac 26255->26642 26257 7ff7ed6a258f 26257->26254 26258 7ff7ed6a25a4 GetDlgItem 26257->26258 26258->26254 26259 7ff7ed6a25b7 26258->26259 26259->26254 26260 7ff7ed6a25be SetWindowTextW 26259->26260 26260->26254 26262 7ff7ed6a2334 26261->26262 26263 7ff7ed6a22fc 26261->26263 26741 7ff7ed6a23f8 GetWindowTextLengthW 26262->26741 26265 7ff7ed6a129c 33 API calls 26263->26265 26266 7ff7ed6a232a memcpy_s 26265->26266 26267 7ff7ed6a1fa0 31 API calls 26266->26267 26268 7ff7ed6a2389 26266->26268 26267->26268 26269 7ff7ed6a23c8 26268->26269 26272 7ff7ed6a23f0 26268->26272 26270 7ff7ed6d2320 _handle_error 8 API calls 26269->26270 26271 7ff7ed6a23dd 26270->26271 26271->25935 26271->25941 26271->26174 26273 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26272->26273 26274 7ff7ed6a23f5 26273->26274 26277 7ff7ed6a8d34 26275->26277 26282 7ff7ed6a8de8 26275->26282 26279 7ff7ed6a8d91 26277->26279 26280 7ff7ed6a8de3 26277->26280 26283 7ff7ed6a8d42 memcpy_s 26277->26283 26279->26283 26284 7ff7ed6d21d0 33 API calls 26279->26284 26785 7ff7ed6a1f80 33 API calls 3 library calls 26280->26785 26786 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26282->26786 26283->25960 26284->26283 26289 7ff7ed6cefb0 26285->26289 26286 7ff7ed6cefd7 26287 7ff7ed6d2320 _handle_error 8 API calls 26286->26287 26288 7ff7ed6cb537 26287->26288 26299 7ff7ed6baae0 26288->26299 26289->26286 26787 7ff7ed6abd0c 33 API calls 26289->26787 26291 7ff7ed6cf02a 26292 7ff7ed6a1150 33 API calls 26291->26292 26293 7ff7ed6cf03f 26292->26293 26294 7ff7ed6a1fa0 31 API calls 26293->26294 26297 7ff7ed6cf04f memcpy_s 26293->26297 26294->26297 26295 7ff7ed6a1fa0 31 API calls 26296 7ff7ed6cf076 26295->26296 26298 7ff7ed6a1fa0 31 API calls 26296->26298 26297->26295 26298->26286 26300 7ff7ed6baaf3 26299->26300 26788 7ff7ed6b9774 26300->26788 26303 7ff7ed6bab86 26306 7ff7ed6bda98 26303->26306 26304 7ff7ed6bab58 LoadStringW 26304->26303 26305 7ff7ed6bab71 LoadStringW 26304->26305 26305->26303 26807 7ff7ed6bd874 26306->26807 26309 7ff7ed6cf0a4 26841 7ff7ed6cae1c PeekMessageW 26309->26841 26312 7ff7ed6cf143 SendMessageW SendMessageW 26314 7ff7ed6cf1a4 SendMessageW 26312->26314 26315 7ff7ed6cf189 26312->26315 26313 7ff7ed6cf0f5 26316 7ff7ed6cf101 ShowWindow SendMessageW SendMessageW 26313->26316 26317 7ff7ed6cf1c3 26314->26317 26318 7ff7ed6cf1c6 SendMessageW SendMessageW 26314->26318 26315->26314 26316->26312 26317->26318 26319 7ff7ed6cf1f3 SendMessageW 26318->26319 26320 7ff7ed6cf218 SendMessageW 26318->26320 26319->26320 26321 7ff7ed6d2320 _handle_error 8 API calls 26320->26321 26322 7ff7ed6cb578 26321->26322 26322->26012 26324 7ff7ed6b309d 26323->26324 26331 7ff7ed6b2f8e 26323->26331 26325 7ff7ed6d2320 _handle_error 8 API calls 26324->26325 26326 7ff7ed6b30b3 26325->26326 26326->26042 26326->26043 26327 7ff7ed6b3077 26327->26324 26328 7ff7ed6b3684 56 API calls 26327->26328 26328->26324 26329 7ff7ed6a129c 33 API calls 26329->26331 26331->26327 26331->26329 26332 7ff7ed6b30c8 26331->26332 26846 7ff7ed6b3684 26331->26846 26333 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26332->26333 26334 7ff7ed6b30cd 26333->26334 26336 7ff7ed6b7fd2 SetCurrentDirectoryW 26335->26336 26337 7ff7ed6b7fcf 26335->26337 26336->26055 26337->26336 26339 7ff7ed6a4255 26338->26339 26340 7ff7ed6a426a 26339->26340 26341 7ff7ed6a129c 33 API calls 26339->26341 26342 7ff7ed6d2320 _handle_error 8 API calls 26340->26342 26341->26340 26343 7ff7ed6a42a1 26342->26343 26344 7ff7ed6a3c84 26343->26344 26345 7ff7ed6a3cab 26344->26345 26994 7ff7ed6a710c 26345->26994 26347 7ff7ed6a3cbb memcpy_s 26347->26091 26349 7ff7ed6a1fb3 26348->26349 26350 7ff7ed6a1fdc 26348->26350 26349->26350 26351 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26349->26351 26350->26106 26352 7ff7ed6a2000 26351->26352 26356 7ff7ed6b216a 26353->26356 26354 7ff7ed6b219e 26357 7ff7ed6b227f 26354->26357 26358 7ff7ed6b6a0c 49 API calls 26354->26358 26355 7ff7ed6b21b1 CreateFileW 26355->26354 26356->26354 26356->26355 26359 7ff7ed6b22af 26357->26359 26362 7ff7ed6a20b0 33 API calls 26357->26362 26361 7ff7ed6b2209 26358->26361 26360 7ff7ed6d2320 _handle_error 8 API calls 26359->26360 26363 7ff7ed6b22c4 26360->26363 26364 7ff7ed6b2246 26361->26364 26365 7ff7ed6b220d CreateFileW 26361->26365 26362->26359 26363->26139 26363->26140 26364->26357 26366 7ff7ed6b22d8 26364->26366 26365->26364 26367 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26366->26367 26368 7ff7ed6b22dd 26367->26368 26370 7ff7ed6b2066 26369->26370 26371 7ff7ed6b2072 26369->26371 26370->26371 27006 7ff7ed6b20d0 26370->27006 27013 7ff7ed6caa08 26373->27013 26375 7ff7ed6cd1ee 26376 7ff7ed6a1fa0 31 API calls 26375->26376 26377 7ff7ed6cd1f7 26376->26377 26378 7ff7ed6d2320 _handle_error 8 API calls 26377->26378 26379 7ff7ed6cbc2b 26378->26379 26379->26145 26380 7ff7ed6ceefa 27145 7ff7ed6a704c 47 API calls memcpy_s 26380->27145 26383 7ff7ed6cef00 27146 7ff7ed6a704c 47 API calls memcpy_s 26383->27146 26384 7ff7ed6bd22c 33 API calls 26522 7ff7ed6ccf03 memcpy_s 26384->26522 26386 7ff7ed6cef06 26390 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26386->26390 26388 7ff7ed6ceeee 26389 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26388->26389 26391 7ff7ed6ceef4 26389->26391 26392 7ff7ed6cef0c 26390->26392 27144 7ff7ed6a704c 47 API calls memcpy_s 26391->27144 26395 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26392->26395 26397 7ff7ed6cef12 26395->26397 26396 7ff7ed6cee4a 26398 7ff7ed6ceed2 26396->26398 26399 7ff7ed6a20b0 33 API calls 26396->26399 26402 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26397->26402 27142 7ff7ed6a1f80 33 API calls 3 library calls 26398->27142 26404 7ff7ed6cee77 26399->26404 26400 7ff7ed6ceee8 27143 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26400->27143 26401 7ff7ed6a13a4 33 API calls 26405 7ff7ed6cdc3a GetTempPathW 26401->26405 26406 7ff7ed6cef18 26402->26406 27141 7ff7ed6cabe8 33 API calls 3 library calls 26404->27141 26405->26522 26413 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26406->26413 26407 7ff7ed6b62dc 35 API calls 26407->26522 26411 7ff7ed6cee8d 26419 7ff7ed6a1fa0 31 API calls 26411->26419 26422 7ff7ed6ceea4 memcpy_s 26411->26422 26412 7ff7ed6a2520 SetWindowTextW 26412->26522 26417 7ff7ed6cef1e 26413->26417 26416 7ff7ed6dbb8c 43 API calls 26416->26522 26424 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26417->26424 26418 7ff7ed6ce7f3 26418->26398 26418->26400 26421 7ff7ed6d21d0 33 API calls 26418->26421 26433 7ff7ed6ce83b memcpy_s 26418->26433 26419->26422 26420 7ff7ed6a1fa0 31 API calls 26420->26398 26421->26433 26422->26420 26423 7ff7ed6b5aa8 33 API calls 26423->26522 26427 7ff7ed6cef24 26424->26427 26425 7ff7ed6a20b0 33 API calls 26425->26522 26426 7ff7ed6caa08 33 API calls 26426->26522 26431 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26427->26431 26429 7ff7ed6a2034 33 API calls 26429->26522 26430 7ff7ed6cef6c 27149 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26430->27149 26438 7ff7ed6cef2a 26431->26438 26432 7ff7ed6b3f30 54 API calls 26432->26522 26442 7ff7ed6a20b0 33 API calls 26433->26442 26481 7ff7ed6ceb8f 26433->26481 26435 7ff7ed6a1fa0 31 API calls 26435->26396 26436 7ff7ed6cef78 27151 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26436->27151 26437 7ff7ed6a4228 33 API calls 26437->26522 26449 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26438->26449 26439 7ff7ed6cef72 27150 7ff7ed6a1f80 33 API calls 3 library calls 26439->27150 26441 7ff7ed6cef66 27148 7ff7ed6a1f80 33 API calls 3 library calls 26441->27148 26450 7ff7ed6ce963 26442->26450 26444 7ff7ed6a8d04 33 API calls 26444->26522 26447 7ff7ed6cec2a 26447->26430 26447->26441 26458 7ff7ed6cec72 memcpy_s 26447->26458 26464 7ff7ed6ced3b memcpy_s 26447->26464 26466 7ff7ed6d21d0 33 API calls 26447->26466 26448 7ff7ed6a2674 31 API calls 26448->26522 26455 7ff7ed6cef30 26449->26455 26457 7ff7ed6cef60 26450->26457 26465 7ff7ed6a129c 33 API calls 26450->26465 26453 7ff7ed6ced40 26453->26436 26453->26439 26453->26464 26470 7ff7ed6d21d0 33 API calls 26453->26470 26454 7ff7ed6ae164 33 API calls 26454->26522 26471 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26455->26471 26456 7ff7ed6b3d34 51 API calls 26456->26522 27147 7ff7ed6a704c 47 API calls memcpy_s 26457->27147 27056 7ff7ed6cf4e0 26458->27056 26460 7ff7ed6cd5e9 GetDlgItem 26467 7ff7ed6a2520 SetWindowTextW 26460->26467 26461 7ff7ed6bdc2c 33 API calls 26461->26522 26463 7ff7ed6c99c8 31 API calls 26463->26522 26464->26435 26472 7ff7ed6ce9a6 26465->26472 26466->26458 26473 7ff7ed6cd608 SendMessageW 26467->26473 26470->26464 26474 7ff7ed6cef36 26471->26474 27137 7ff7ed6bd22c 26472->27137 26473->26522 26478 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26474->26478 26477 7ff7ed6b5b60 53 API calls 26477->26522 26480 7ff7ed6cef3c 26478->26480 26479 7ff7ed6cd63c SendMessageW 26479->26522 26485 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26480->26485 26481->26447 26481->26453 26488 7ff7ed6cef54 26481->26488 26490 7ff7ed6cef5a 26481->26490 26489 7ff7ed6cef42 26485->26489 26487 7ff7ed6a129c 33 API calls 26510 7ff7ed6ce9d1 26487->26510 26491 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26488->26491 26494 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26489->26494 26493 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26490->26493 26491->26490 26492 7ff7ed6a1744 33 API calls 26492->26522 26493->26457 26497 7ff7ed6cef48 26494->26497 26495 7ff7ed6b5820 33 API calls 26495->26522 26496 7ff7ed6b32a8 51 API calls 26496->26522 26498 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26497->26498 26500 7ff7ed6cef4e 26498->26500 26499 7ff7ed6a250c SetDlgItemTextW 26499->26522 26504 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26500->26504 26502 7ff7ed6a1150 33 API calls 26502->26522 26504->26488 26505 7ff7ed6c13c4 CompareStringW 26505->26510 26507 7ff7ed6a1fa0 31 API calls 26507->26510 26509 7ff7ed6a129c 33 API calls 26509->26522 26510->26481 26510->26487 26510->26497 26510->26500 26510->26505 26510->26507 26514 7ff7ed6bd22c 33 API calls 26510->26514 26511 7ff7ed6cdf99 EndDialog 26511->26522 26513 7ff7ed6b32bc 51 API calls 26513->26522 26514->26510 26515 7ff7ed6cdb21 MoveFileW 26517 7ff7ed6cdb55 MoveFileExW 26515->26517 26518 7ff7ed6cdb70 26515->26518 26516 7ff7ed6a1fa0 31 API calls 26516->26522 26517->26518 26519 7ff7ed6a1fa0 31 API calls 26518->26519 26518->26522 26519->26518 26520 7ff7ed6b2f58 56 API calls 26520->26522 26522->26375 26522->26380 26522->26383 26522->26384 26522->26386 26522->26388 26522->26391 26522->26392 26522->26396 26522->26397 26522->26401 26522->26406 26522->26407 26522->26412 26522->26416 26522->26417 26522->26418 26522->26423 26522->26425 26522->26426 26522->26427 26522->26429 26522->26432 26522->26437 26522->26438 26522->26444 26522->26448 26522->26454 26522->26455 26522->26456 26522->26461 26522->26463 26522->26474 26522->26477 26522->26479 26522->26480 26522->26489 26522->26492 26522->26495 26522->26496 26522->26499 26522->26502 26522->26509 26522->26511 26522->26513 26522->26515 26522->26516 26522->26520 27017 7ff7ed6c13c4 CompareStringW 26522->27017 27018 7ff7ed6ca440 26522->27018 27094 7ff7ed6bcfa4 35 API calls _invalid_parameter_noinfo_noreturn 26522->27094 27095 7ff7ed6c95b4 33 API calls Concurrency::cancel_current_task 26522->27095 27096 7ff7ed6d0684 31 API calls _invalid_parameter_noinfo_noreturn 26522->27096 27097 7ff7ed6adf4c 47 API calls memcpy_s 26522->27097 27098 7ff7ed6ca834 33 API calls _invalid_parameter_noinfo_noreturn 26522->27098 27099 7ff7ed6c9518 33 API calls 26522->27099 27100 7ff7ed6cabe8 33 API calls 3 library calls 26522->27100 27101 7ff7ed6b7368 33 API calls 2 library calls 26522->27101 27102 7ff7ed6b4088 33 API calls 26522->27102 27103 7ff7ed6b65b0 33 API calls 3 library calls 26522->27103 27104 7ff7ed6b72cc 26522->27104 27108 7ff7ed6b31bc 26522->27108 27122 7ff7ed6b3ea0 FindClose 26522->27122 27123 7ff7ed6c13f4 CompareStringW 26522->27123 27124 7ff7ed6c9cd0 47 API calls 26522->27124 27125 7ff7ed6c87d8 51 API calls 3 library calls 26522->27125 27126 7ff7ed6cab54 33 API calls _handle_error 26522->27126 27127 7ff7ed6b7df4 26522->27127 27135 7ff7ed6b5b08 CompareStringW 26522->27135 27136 7ff7ed6b7eb0 47 API calls 26522->27136 26524 7ff7ed6cf9a3 26523->26524 26525 7ff7ed6a20b0 33 API calls 26524->26525 26527 7ff7ed6cf9b9 26525->26527 26526 7ff7ed6cf9ee 27164 7ff7ed6ae34c 26526->27164 26527->26526 26528 7ff7ed6a20b0 33 API calls 26527->26528 26528->26526 26530 7ff7ed6cfa4b 27184 7ff7ed6ae7a8 26530->27184 26534 7ff7ed6cfa61 26535 7ff7ed6d2320 _handle_error 8 API calls 26534->26535 26536 7ff7ed6cbc52 26535->26536 26536->26160 28311 7ff7ed6c849c 26538->28311 26541 7ff7ed6cf4b7 26543 7ff7ed6d2320 _handle_error 8 API calls 26541->26543 26542 7ff7ed6cf3c7 GetWindow 26547 7ff7ed6cf3e2 26542->26547 26544 7ff7ed6cbe9b 26543->26544 26544->25920 26544->25921 26545 7ff7ed6cf3ee GetClassNameW 28316 7ff7ed6c13c4 CompareStringW 26545->28316 26547->26541 26547->26545 26548 7ff7ed6cf496 GetWindow 26547->26548 26549 7ff7ed6cf417 GetWindowLongPtrW 26547->26549 26548->26541 26548->26547 26549->26548 26550 7ff7ed6cf429 SendMessageW 26549->26550 26550->26548 26551 7ff7ed6cf445 GetObjectW 26550->26551 28317 7ff7ed6c8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26551->28317 26553 7ff7ed6cf461 28318 7ff7ed6c84cc 26553->28318 28322 7ff7ed6c8df4 16 API calls _handle_error 26553->28322 26556 7ff7ed6cf479 SendMessageW DeleteObject 26556->26548 26558 7ff7ed6b6300 26557->26558 26563 7ff7ed6b638d 26557->26563 26559 7ff7ed6a13a4 33 API calls 26558->26559 26560 7ff7ed6b631b GetCurrentDirectoryW 26559->26560 26561 7ff7ed6b6341 26560->26561 26562 7ff7ed6a20b0 33 API calls 26561->26562 26564 7ff7ed6b634f 26562->26564 26563->25936 26564->26563 26565 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26564->26565 26566 7ff7ed6b63a9 26565->26566 26568 7ff7ed6a2527 26567->26568 26569 7ff7ed6a252a SetWindowTextW 26567->26569 26568->26569 26570 7ff7ed70e2e0 26569->26570 26571->25945 26573 7ff7ed6a2513 26572->26573 26574 7ff7ed6a2516 SetDlgItemTextW 26572->26574 26573->26574 26576 7ff7ed6a12d0 26575->26576 26577 7ff7ed6a139b 26575->26577 26580 7ff7ed6a12de memcpy_s 26576->26580 26581 7ff7ed6a1396 26576->26581 26582 7ff7ed6a1338 26576->26582 28326 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26577->28326 26580->25982 28325 7ff7ed6a1f80 33 API calls 3 library calls 26581->28325 26582->26580 26584 7ff7ed6d21d0 33 API calls 26582->26584 26584->26580 26585->26029 26587 7ff7ed6b32bc 51 API calls 26586->26587 26588 7ff7ed6b32b1 26587->26588 26588->26023 26588->26049 26589->26023 26591 7ff7ed6a13a4 33 API calls 26590->26591 26592 7ff7ed6b6489 26591->26592 26593 7ff7ed6b648c GetModuleFileNameW 26592->26593 26595 7ff7ed6b64dc 26592->26595 26594 7ff7ed6b64de 26593->26594 26596 7ff7ed6b64a7 26593->26596 26594->26595 26597 7ff7ed6a129c 33 API calls 26595->26597 26596->26592 26599 7ff7ed6b6506 26597->26599 26598 7ff7ed6b653e 26598->26089 26599->26598 26600 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26599->26600 26601 7ff7ed6b6560 26600->26601 26602->26104 26604 7ff7ed6a20f6 26603->26604 26606 7ff7ed6a20cb memcpy_s 26603->26606 28327 7ff7ed6a1474 33 API calls 3 library calls 26604->28327 26606->26121 26607->26132 26608->26143 26609->26153 26610->26158 26611->26167 26613 7ff7ed6d3620 26612->26613 26613->26171 26613->26613 26614->26087 26616 7ff7ed6a1177 26615->26616 26617 7ff7ed6a2034 33 API calls 26616->26617 26618 7ff7ed6a1185 memcpy_s 26617->26618 26618->26102 26620 7ff7ed6a2085 26619->26620 26622 7ff7ed6a2059 memcpy_s 26619->26622 28328 7ff7ed6a15b8 33 API calls 3 library calls 26620->28328 26622->26076 26624 7ff7ed6d2329 26623->26624 26625 7ff7ed6d2550 IsProcessorFeaturePresent 26624->26625 26626 7ff7ed6cc350 26624->26626 26627 7ff7ed6d2568 26625->26627 28329 7ff7ed6d2744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26627->28329 26629 7ff7ed6d257b 28330 7ff7ed6d2510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26629->28330 28331 7ff7ed6d783c 31 API calls 2 library calls 26632->28331 26634 7ff7ed6d791d 28332 7ff7ed6d7934 16 API calls abort 26634->28332 26637->26125 26638->26192 26639->26217 26640->26232 26641->26244 26667 7ff7ed6b3e28 26642->26667 26646 7ff7ed6ba519 26647 7ff7ed6ba589 26646->26647 26665 7ff7ed6ba56a SetDlgItemTextW 26646->26665 26688 7ff7ed6b9800 26646->26688 26673 7ff7ed6b9408 26647->26673 26650 7ff7ed6ba6f2 GetSystemMetrics GetWindow 26654 7ff7ed6ba821 26650->26654 26664 7ff7ed6ba71d 26650->26664 26651 7ff7ed6ba603 26652 7ff7ed6ba6c2 26651->26652 26653 7ff7ed6ba60c GetWindowLongPtrW 26651->26653 26692 7ff7ed6b95a8 26652->26692 26656 7ff7ed70e2c0 26653->26656 26655 7ff7ed6d2320 _handle_error 8 API calls 26654->26655 26658 7ff7ed6ba830 26655->26658 26659 7ff7ed6ba6aa GetWindowRect 26656->26659 26658->26257 26659->26652 26662 7ff7ed6ba6e5 SetWindowTextW 26662->26650 26663 7ff7ed6ba73e GetWindowRect 26663->26664 26664->26654 26664->26663 26666 7ff7ed6ba800 GetWindow 26664->26666 26665->26646 26666->26654 26666->26664 26668 7ff7ed6b3e4d _snwprintf 26667->26668 26701 7ff7ed6d9ef0 26668->26701 26671 7ff7ed6c0f68 WideCharToMultiByte 26672 7ff7ed6c0faa 26671->26672 26672->26646 26674 7ff7ed6b95a8 47 API calls 26673->26674 26676 7ff7ed6b944f 26674->26676 26675 7ff7ed6d2320 _handle_error 8 API calls 26677 7ff7ed6b958e GetWindowRect GetClientRect 26675->26677 26678 7ff7ed6a129c 33 API calls 26676->26678 26684 7ff7ed6b955a 26676->26684 26677->26650 26677->26651 26679 7ff7ed6b949c 26678->26679 26680 7ff7ed6a129c 33 API calls 26679->26680 26687 7ff7ed6b95a1 26679->26687 26683 7ff7ed6b9514 26680->26683 26681 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26682 7ff7ed6b95a7 26681->26682 26683->26684 26685 7ff7ed6b959c 26683->26685 26684->26675 26686 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26685->26686 26686->26687 26687->26681 26689 7ff7ed6b9840 26688->26689 26691 7ff7ed6b9869 26688->26691 26740 7ff7ed6da270 31 API calls 2 library calls 26689->26740 26691->26646 26693 7ff7ed6b3e28 swprintf 46 API calls 26692->26693 26694 7ff7ed6b95eb 26693->26694 26695 7ff7ed6c0f68 WideCharToMultiByte 26694->26695 26696 7ff7ed6b9603 26695->26696 26697 7ff7ed6b9800 31 API calls 26696->26697 26698 7ff7ed6b961b 26697->26698 26699 7ff7ed6d2320 _handle_error 8 API calls 26698->26699 26700 7ff7ed6b962b 26699->26700 26700->26650 26700->26662 26702 7ff7ed6d9f36 26701->26702 26703 7ff7ed6d9f4e 26701->26703 26728 7ff7ed6dd69c 15 API calls memcpy_s 26702->26728 26703->26702 26705 7ff7ed6d9f58 26703->26705 26730 7ff7ed6d7ef0 35 API calls 2 library calls 26705->26730 26706 7ff7ed6d9f3b 26729 7ff7ed6d78e4 31 API calls _invalid_parameter_noinfo_noreturn 26706->26729 26709 7ff7ed6d2320 _handle_error 8 API calls 26711 7ff7ed6b3e69 26709->26711 26710 7ff7ed6d9f69 memcpy_s 26731 7ff7ed6d7e70 15 API calls memcpy_s 26710->26731 26711->26671 26713 7ff7ed6d9fd4 26732 7ff7ed6d82f8 46 API calls 3 library calls 26713->26732 26715 7ff7ed6d9fdd 26716 7ff7ed6da014 26715->26716 26717 7ff7ed6d9fe5 26715->26717 26719 7ff7ed6da01a 26716->26719 26720 7ff7ed6da06c 26716->26720 26721 7ff7ed6da023 26716->26721 26722 7ff7ed6da092 26716->26722 26733 7ff7ed6dd90c 26717->26733 26719->26720 26719->26721 26723 7ff7ed6dd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26720->26723 26725 7ff7ed6dd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26721->26725 26722->26720 26724 7ff7ed6da09c 26722->26724 26727 7ff7ed6d9f46 26723->26727 26726 7ff7ed6dd90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26724->26726 26725->26727 26726->26727 26727->26709 26728->26706 26729->26727 26730->26710 26731->26713 26732->26715 26734 7ff7ed6dd911 RtlFreeHeap 26733->26734 26738 7ff7ed6dd941 Concurrency::details::SchedulerProxy::DeleteThis 26733->26738 26735 7ff7ed6dd92c 26734->26735 26734->26738 26739 7ff7ed6dd69c 15 API calls memcpy_s 26735->26739 26737 7ff7ed6dd931 GetLastError 26737->26738 26738->26727 26739->26737 26740->26691 26753 7ff7ed6a13a4 26741->26753 26744 7ff7ed6a2494 26745 7ff7ed6a129c 33 API calls 26744->26745 26746 7ff7ed6a24a2 26745->26746 26748 7ff7ed6a2505 26746->26748 26749 7ff7ed6a24dd 26746->26749 26747 7ff7ed6d2320 _handle_error 8 API calls 26750 7ff7ed6a24f3 26747->26750 26751 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26748->26751 26749->26747 26750->26266 26752 7ff7ed6a250a 26751->26752 26754 7ff7ed6a13ad 26753->26754 26762 7ff7ed6a142d GetWindowTextW 26753->26762 26755 7ff7ed6a13ce 26754->26755 26756 7ff7ed6a143d 26754->26756 26758 7ff7ed6a13db memcpy_s 26755->26758 26763 7ff7ed6d21d0 26755->26763 26773 7ff7ed6a2018 33 API calls std::_Xinvalid_argument 26756->26773 26772 7ff7ed6a197c 31 API calls _invalid_parameter_noinfo_noreturn 26758->26772 26762->26744 26765 7ff7ed6d21db 26763->26765 26764 7ff7ed6d21f4 26764->26758 26765->26764 26767 7ff7ed6d21fa 26765->26767 26774 7ff7ed6dbbc0 26765->26774 26770 7ff7ed6d2205 26767->26770 26777 7ff7ed6d2f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 26767->26777 26778 7ff7ed6a1f80 33 API calls 3 library calls 26770->26778 26771 7ff7ed6d220b 26772->26762 26779 7ff7ed6dbc00 26774->26779 26777->26770 26778->26771 26784 7ff7ed6df398 EnterCriticalSection 26779->26784 26785->26282 26787->26291 26795 7ff7ed6b9638 26788->26795 26791 7ff7ed6b9800 31 API calls 26792 7ff7ed6b97d9 26791->26792 26793 7ff7ed6d2320 _handle_error 8 API calls 26792->26793 26794 7ff7ed6b97f2 26793->26794 26794->26303 26794->26304 26796 7ff7ed6b9692 26795->26796 26804 7ff7ed6b9730 26795->26804 26797 7ff7ed6c0f68 WideCharToMultiByte 26796->26797 26798 7ff7ed6b96c0 26796->26798 26797->26798 26800 7ff7ed6b96ef 26798->26800 26805 7ff7ed6baa88 45 API calls _snwprintf 26798->26805 26799 7ff7ed6d2320 _handle_error 8 API calls 26801 7ff7ed6b9764 26799->26801 26806 7ff7ed6da270 31 API calls 2 library calls 26800->26806 26801->26791 26801->26792 26804->26799 26805->26800 26806->26804 26823 7ff7ed6bd4d0 26807->26823 26811 7ff7ed6d9ef0 swprintf 46 API calls 26812 7ff7ed6bd8e5 _snwprintf 26811->26812 26812->26811 26814 7ff7ed6bd974 26812->26814 26837 7ff7ed6a9d78 33 API calls 26812->26837 26813 7ff7ed6bda17 26817 7ff7ed6d2320 _handle_error 8 API calls 26813->26817 26816 7ff7ed6bd9a3 26814->26816 26838 7ff7ed6a9d78 33 API calls 26814->26838 26816->26813 26818 7ff7ed6bda3f 26816->26818 26819 7ff7ed6bda2b 26817->26819 26820 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26818->26820 26819->26309 26821 7ff7ed6bda44 26820->26821 26824 7ff7ed6bd665 26823->26824 26826 7ff7ed6bd502 26823->26826 26827 7ff7ed6bcb80 26824->26827 26825 7ff7ed6a1744 33 API calls 26825->26826 26826->26824 26826->26825 26828 7ff7ed6bcc80 26827->26828 26829 7ff7ed6bcbb6 26827->26829 26840 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26828->26840 26831 7ff7ed6bcbc6 26829->26831 26833 7ff7ed6bcc7b 26829->26833 26835 7ff7ed6bcc20 26829->26835 26831->26812 26839 7ff7ed6a1f80 33 API calls 3 library calls 26833->26839 26835->26831 26836 7ff7ed6d21d0 33 API calls 26835->26836 26836->26831 26837->26812 26838->26816 26839->26828 26842 7ff7ed6cae80 GetDlgItem 26841->26842 26843 7ff7ed6cae3c GetMessageW 26841->26843 26842->26312 26842->26313 26844 7ff7ed6cae5b IsDialogMessageW 26843->26844 26845 7ff7ed6cae6a TranslateMessage DispatchMessageW 26843->26845 26844->26842 26844->26845 26845->26842 26848 7ff7ed6b36b3 26846->26848 26847 7ff7ed6b36e0 26880 7ff7ed6b32bc 26847->26880 26848->26847 26849 7ff7ed6b36cc CreateDirectoryW 26848->26849 26849->26847 26851 7ff7ed6b377d 26849->26851 26853 7ff7ed6b378d 26851->26853 26866 7ff7ed6b3d34 26851->26866 26857 7ff7ed6d2320 _handle_error 8 API calls 26853->26857 26854 7ff7ed6b3791 GetLastError 26854->26853 26859 7ff7ed6b37b9 26857->26859 26859->26331 26860 7ff7ed6b3720 CreateDirectoryW 26861 7ff7ed6b373b 26860->26861 26862 7ff7ed6b3774 26861->26862 26863 7ff7ed6b37ce 26861->26863 26862->26851 26862->26854 26864 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26863->26864 26865 7ff7ed6b37d3 26864->26865 26867 7ff7ed6b3d5e SetFileAttributesW 26866->26867 26868 7ff7ed6b3d5b 26866->26868 26869 7ff7ed6b3d74 26867->26869 26876 7ff7ed6b3df5 26867->26876 26868->26867 26871 7ff7ed6b6a0c 49 API calls 26869->26871 26870 7ff7ed6d2320 _handle_error 8 API calls 26872 7ff7ed6b3e0a 26870->26872 26873 7ff7ed6b3d99 26871->26873 26872->26853 26874 7ff7ed6b3d9d SetFileAttributesW 26873->26874 26875 7ff7ed6b3dbc 26873->26875 26874->26875 26875->26876 26877 7ff7ed6b3e1a 26875->26877 26876->26870 26878 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26877->26878 26879 7ff7ed6b3e1f 26878->26879 26881 7ff7ed6b32e4 26880->26881 26882 7ff7ed6b32e7 GetFileAttributesW 26880->26882 26881->26882 26883 7ff7ed6b32f8 26882->26883 26891 7ff7ed6b3375 26882->26891 26884 7ff7ed6b6a0c 49 API calls 26883->26884 26886 7ff7ed6b331f 26884->26886 26885 7ff7ed6d2320 _handle_error 8 API calls 26887 7ff7ed6b3389 26885->26887 26888 7ff7ed6b3323 GetFileAttributesW 26886->26888 26889 7ff7ed6b333c 26886->26889 26887->26854 26894 7ff7ed6b6a0c 26887->26894 26888->26889 26890 7ff7ed6b3399 26889->26890 26889->26891 26892 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26890->26892 26891->26885 26893 7ff7ed6b339e 26892->26893 26895 7ff7ed6b6a4b 26894->26895 26913 7ff7ed6b6a44 26894->26913 26897 7ff7ed6a129c 33 API calls 26895->26897 26896 7ff7ed6d2320 _handle_error 8 API calls 26898 7ff7ed6b371c 26896->26898 26899 7ff7ed6b6a76 26897->26899 26898->26860 26898->26861 26900 7ff7ed6b6a96 26899->26900 26901 7ff7ed6b6cc7 26899->26901 26903 7ff7ed6b6ab0 26900->26903 26927 7ff7ed6b6b49 26900->26927 26902 7ff7ed6b62dc 35 API calls 26901->26902 26905 7ff7ed6b6ce6 26902->26905 26904 7ff7ed6b70ab 26903->26904 26967 7ff7ed6ac098 33 API calls 2 library calls 26903->26967 26987 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26904->26987 26906 7ff7ed6b6eef 26905->26906 26910 7ff7ed6b6d1b 26905->26910 26912 7ff7ed6b6b44 26905->26912 26909 7ff7ed6b70cf 26906->26909 26984 7ff7ed6ac098 33 API calls 2 library calls 26906->26984 26990 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26909->26990 26916 7ff7ed6b70bd 26910->26916 26970 7ff7ed6ac098 33 API calls 2 library calls 26910->26970 26911 7ff7ed6b70b1 26924 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26911->26924 26912->26911 26912->26913 26917 7ff7ed6b70d5 26912->26917 26920 7ff7ed6b70a6 26912->26920 26913->26896 26914 7ff7ed6b6b03 26928 7ff7ed6a1fa0 31 API calls 26914->26928 26934 7ff7ed6b6b15 memcpy_s 26914->26934 26988 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26916->26988 26919 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26917->26919 26926 7ff7ed6b70db 26919->26926 26932 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26920->26932 26921 7ff7ed6b6f56 26985 7ff7ed6a11cc 33 API calls memcpy_s 26921->26985 26925 7ff7ed6b70b7 26924->26925 26936 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26925->26936 26938 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26926->26938 26927->26912 26933 7ff7ed6a129c 33 API calls 26927->26933 26928->26934 26930 7ff7ed6b70c3 26941 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26930->26941 26931 7ff7ed6a1fa0 31 API calls 26931->26912 26932->26904 26939 7ff7ed6b6bbe 26933->26939 26934->26931 26935 7ff7ed6b6f69 26986 7ff7ed6b57ac 33 API calls memcpy_s 26935->26986 26936->26916 26937 7ff7ed6a1fa0 31 API calls 26951 7ff7ed6b6df5 26937->26951 26942 7ff7ed6b70e1 26938->26942 26968 7ff7ed6b5820 33 API calls 26939->26968 26944 7ff7ed6b70c9 26941->26944 26989 7ff7ed6a704c 47 API calls memcpy_s 26944->26989 26945 7ff7ed6b6bd3 26969 7ff7ed6ae164 33 API calls 2 library calls 26945->26969 26946 7ff7ed6b6d76 memcpy_s 26946->26930 26946->26937 26947 7ff7ed6a1fa0 31 API calls 26950 7ff7ed6b6fec 26947->26950 26953 7ff7ed6a1fa0 31 API calls 26950->26953 26956 7ff7ed6b6e21 26951->26956 26971 7ff7ed6a1744 26951->26971 26952 7ff7ed6b6f79 memcpy_s 26952->26926 26952->26947 26955 7ff7ed6b6ff6 26953->26955 26954 7ff7ed6a1fa0 31 API calls 26958 7ff7ed6b6c6d 26954->26958 26959 7ff7ed6a1fa0 31 API calls 26955->26959 26956->26944 26960 7ff7ed6a129c 33 API calls 26956->26960 26961 7ff7ed6a1fa0 31 API calls 26958->26961 26959->26912 26962 7ff7ed6b6ec2 26960->26962 26961->26912 26964 7ff7ed6a2034 33 API calls 26962->26964 26963 7ff7ed6b6be9 memcpy_s 26963->26925 26963->26954 26965 7ff7ed6b6edf 26964->26965 26966 7ff7ed6a1fa0 31 API calls 26965->26966 26966->26912 26967->26914 26968->26945 26969->26963 26970->26946 26976 7ff7ed6a1784 26971->26976 26983 7ff7ed6a18a1 26971->26983 26973 7ff7ed6a18a7 26992 7ff7ed6a1f80 33 API calls 3 library calls 26973->26992 26975 7ff7ed6a18ad 26993 7ff7ed6d354c 31 API calls __std_exception_copy 26975->26993 26976->26973 26978 7ff7ed6d21d0 33 API calls 26976->26978 26980 7ff7ed6a17ac memcpy_s 26976->26980 26978->26980 26979 7ff7ed6a18d9 26979->26956 26981 7ff7ed6a1859 memcpy_s 26980->26981 26982 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 26980->26982 26981->26956 26982->26983 26991 7ff7ed6a2004 33 API calls std::_Xinvalid_argument 26983->26991 26984->26921 26985->26935 26986->26952 26989->26909 26992->26975 26993->26979 26995 7ff7ed6a7206 26994->26995 26996 7ff7ed6a713b 26994->26996 27004 7ff7ed6a704c 47 API calls memcpy_s 26995->27004 27000 7ff7ed6a714b memcpy_s 26996->27000 27003 7ff7ed6a3f48 33 API calls 2 library calls 26996->27003 26999 7ff7ed6a720b 27001 7ff7ed6a7273 26999->27001 27005 7ff7ed6a889c 8 API calls memcpy_s 26999->27005 27000->26347 27001->26347 27003->27000 27004->26999 27005->26999 27007 7ff7ed6b20ea 27006->27007 27008 7ff7ed6b2102 27006->27008 27007->27008 27010 7ff7ed6b20f6 CloseHandle 27007->27010 27009 7ff7ed6b2126 27008->27009 27012 7ff7ed6ab544 99 API calls 27008->27012 27009->26371 27010->27008 27012->27009 27014 7ff7ed6caa2f 27013->27014 27015 7ff7ed6caa36 27013->27015 27014->26522 27015->27014 27016 7ff7ed6a1744 33 API calls 27015->27016 27016->27015 27017->26522 27019 7ff7ed6ca47f 27018->27019 27039 7ff7ed6ca706 27018->27039 27152 7ff7ed6ccdf8 33 API calls 27019->27152 27021 7ff7ed6d2320 _handle_error 8 API calls 27023 7ff7ed6ca717 27021->27023 27022 7ff7ed6ca49e 27024 7ff7ed6a129c 33 API calls 27022->27024 27023->26460 27025 7ff7ed6ca4de 27024->27025 27026 7ff7ed6a129c 33 API calls 27025->27026 27027 7ff7ed6ca517 27026->27027 27028 7ff7ed6a129c 33 API calls 27027->27028 27029 7ff7ed6ca54a 27028->27029 27153 7ff7ed6ca834 33 API calls _invalid_parameter_noinfo_noreturn 27029->27153 27031 7ff7ed6ca573 27033 7ff7ed6ca73a 27031->27033 27035 7ff7ed6ca740 27031->27035 27037 7ff7ed6a20b0 33 API calls 27031->27037 27040 7ff7ed6ca685 27031->27040 27046 7ff7ed6ca734 27031->27046 27032 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27032->27033 27034 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27033->27034 27034->27035 27036 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27035->27036 27038 7ff7ed6ca746 27036->27038 27037->27040 27042 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27038->27042 27039->27021 27040->27038 27040->27039 27041 7ff7ed6ca72f 27040->27041 27044 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27041->27044 27043 7ff7ed6ca74c 27042->27043 27045 7ff7ed6a255c 61 API calls 27043->27045 27044->27046 27047 7ff7ed6ca795 27045->27047 27046->27032 27048 7ff7ed6ca7b1 27047->27048 27049 7ff7ed6ca801 SetDlgItemTextW 27047->27049 27052 7ff7ed6ca7a1 27047->27052 27050 7ff7ed6d2320 _handle_error 8 API calls 27048->27050 27049->27048 27051 7ff7ed6ca827 27050->27051 27051->26460 27052->27048 27055 7ff7ed6ca7ad 27052->27055 27154 7ff7ed6bbb00 102 API calls 27052->27154 27053 7ff7ed6ca7b7 EndDialog 27053->27048 27055->27048 27055->27053 27061 7ff7ed6cf529 memcpy_s 27056->27061 27071 7ff7ed6cf87d 27056->27071 27057 7ff7ed6a1fa0 31 API calls 27058 7ff7ed6cf89c 27057->27058 27059 7ff7ed6d2320 _handle_error 8 API calls 27058->27059 27060 7ff7ed6cf8a8 27059->27060 27060->26464 27062 7ff7ed6cf684 27061->27062 27155 7ff7ed6c13c4 CompareStringW 27061->27155 27064 7ff7ed6a129c 33 API calls 27062->27064 27065 7ff7ed6cf6c0 27064->27065 27066 7ff7ed6b32a8 51 API calls 27065->27066 27067 7ff7ed6cf6ca 27066->27067 27068 7ff7ed6a1fa0 31 API calls 27067->27068 27072 7ff7ed6cf6d5 27068->27072 27069 7ff7ed6cf742 ShellExecuteExW 27070 7ff7ed6cf846 27069->27070 27077 7ff7ed6cf755 27069->27077 27070->27071 27075 7ff7ed6cf8fb 27070->27075 27071->27057 27072->27069 27074 7ff7ed6a129c 33 API calls 27072->27074 27073 7ff7ed6cf78e 27157 7ff7ed6cfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27073->27157 27078 7ff7ed6cf717 27074->27078 27080 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27075->27080 27076 7ff7ed6cf7e3 CloseHandle 27081 7ff7ed6cf801 27076->27081 27082 7ff7ed6cf7f2 27076->27082 27077->27073 27077->27076 27087 7ff7ed6cf781 ShowWindow 27077->27087 27156 7ff7ed6b5b60 53 API calls 2 library calls 27078->27156 27085 7ff7ed6cf900 27080->27085 27081->27070 27091 7ff7ed6cf837 ShowWindow 27081->27091 27158 7ff7ed6c13c4 CompareStringW 27082->27158 27084 7ff7ed6cf725 27089 7ff7ed6a1fa0 31 API calls 27084->27089 27087->27073 27088 7ff7ed6cf7a6 27088->27076 27092 7ff7ed6cf7b4 GetExitCodeProcess 27088->27092 27090 7ff7ed6cf72f 27089->27090 27090->27069 27091->27070 27092->27076 27093 7ff7ed6cf7c7 27092->27093 27093->27076 27094->26522 27095->26522 27096->26522 27097->26522 27098->26522 27099->26522 27100->26522 27101->26522 27102->26522 27103->26522 27105 7ff7ed6b72ea 27104->27105 27159 7ff7ed6ab3a8 27105->27159 27109 7ff7ed6b31e4 27108->27109 27110 7ff7ed6b31e7 DeleteFileW 27108->27110 27109->27110 27111 7ff7ed6b31fd 27110->27111 27118 7ff7ed6b327c 27110->27118 27112 7ff7ed6b6a0c 49 API calls 27111->27112 27114 7ff7ed6b3222 27112->27114 27113 7ff7ed6d2320 _handle_error 8 API calls 27115 7ff7ed6b3291 27113->27115 27116 7ff7ed6b3226 DeleteFileW 27114->27116 27117 7ff7ed6b3243 27114->27117 27115->26522 27116->27117 27117->27118 27119 7ff7ed6b32a1 27117->27119 27118->27113 27120 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27119->27120 27121 7ff7ed6b32a6 27120->27121 27123->26522 27124->26522 27125->26522 27126->26522 27128 7ff7ed6b7e0c 27127->27128 27129 7ff7ed6b7e55 27128->27129 27130 7ff7ed6b7e23 27128->27130 27163 7ff7ed6a704c 47 API calls memcpy_s 27129->27163 27132 7ff7ed6a129c 33 API calls 27130->27132 27134 7ff7ed6b7e47 27132->27134 27133 7ff7ed6b7e5a 27134->26522 27135->26522 27136->26522 27139 7ff7ed6bd25e 27137->27139 27138 7ff7ed6bd292 27138->26510 27139->27138 27140 7ff7ed6a1744 33 API calls 27139->27140 27140->27139 27141->26411 27142->26400 27144->26380 27145->26383 27146->26386 27147->26441 27148->26430 27150->26436 27152->27022 27153->27031 27154->27055 27155->27062 27156->27084 27157->27088 27158->27081 27162 7ff7ed6ab3f2 memcpy_s 27159->27162 27160 7ff7ed6d2320 _handle_error 8 API calls 27161 7ff7ed6ab4b6 27160->27161 27161->26522 27162->27160 27163->27133 27220 7ff7ed6b86ec 27164->27220 27166 7ff7ed6ae3c4 27230 7ff7ed6ae600 27166->27230 27168 7ff7ed6ae4d4 27170 7ff7ed6d21d0 33 API calls 27168->27170 27169 7ff7ed6ae454 27169->27168 27171 7ff7ed6ae549 27169->27171 27173 7ff7ed6ae4f0 27170->27173 27172 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27171->27172 27177 7ff7ed6ae54e 27172->27177 27236 7ff7ed6c3148 102 API calls 27173->27236 27175 7ff7ed6b190d 27175->26530 27176 7ff7ed6ae51d 27178 7ff7ed6d2320 _handle_error 8 API calls 27176->27178 27177->27175 27180 7ff7ed6a1fa0 31 API calls 27177->27180 27181 7ff7ed6b18c2 27177->27181 27179 7ff7ed6ae52d 27178->27179 27179->26530 27180->27177 27181->27175 27182 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27181->27182 27183 7ff7ed6b193b 27182->27183 27185 7ff7ed6ae7ea 27184->27185 27186 7ff7ed6ae864 27185->27186 27188 7ff7ed6ae8a1 27185->27188 27252 7ff7ed6b3ec8 27185->27252 27186->27188 27189 7ff7ed6ae993 27186->27189 27196 7ff7ed6ae900 27188->27196 27259 7ff7ed6af578 27188->27259 27190 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27189->27190 27194 7ff7ed6ae998 27190->27194 27191 7ff7ed6ae955 27193 7ff7ed6d2320 _handle_error 8 API calls 27191->27193 27195 7ff7ed6ae97e 27193->27195 27198 7ff7ed6ae578 27195->27198 27196->27191 27295 7ff7ed6a28a4 82 API calls 2 library calls 27196->27295 28297 7ff7ed6b15d8 27198->28297 27201 7ff7ed6ae59e 27203 7ff7ed6a1fa0 31 API calls 27201->27203 27202 7ff7ed6c1870 108 API calls 27202->27201 27204 7ff7ed6ae5b7 27203->27204 27205 7ff7ed6a1fa0 31 API calls 27204->27205 27206 7ff7ed6ae5c3 27205->27206 27207 7ff7ed6a1fa0 31 API calls 27206->27207 27208 7ff7ed6ae5cf 27207->27208 27209 7ff7ed6b878c 108 API calls 27208->27209 27210 7ff7ed6ae5db 27209->27210 27211 7ff7ed6a1fa0 31 API calls 27210->27211 27212 7ff7ed6ae5e4 27211->27212 27213 7ff7ed6a1fa0 31 API calls 27212->27213 27216 7ff7ed6ae5ed 27213->27216 27214 7ff7ed6b18c2 27215 7ff7ed6b190d 27214->27215 27218 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27214->27218 27215->26534 27216->27214 27216->27215 27217 7ff7ed6a1fa0 31 API calls 27216->27217 27217->27216 27219 7ff7ed6b193b 27218->27219 27221 7ff7ed6b870a 27220->27221 27222 7ff7ed6d21d0 33 API calls 27221->27222 27223 7ff7ed6b872f 27222->27223 27225 7ff7ed6b8743 27223->27225 27237 7ff7ed6a9f1c 27223->27237 27226 7ff7ed6d21d0 33 API calls 27225->27226 27227 7ff7ed6b8759 27226->27227 27228 7ff7ed6b876b 27227->27228 27229 7ff7ed6a9f1c 33 API calls 27227->27229 27228->27166 27229->27228 27231 7ff7ed6ae627 27230->27231 27233 7ff7ed6ae62c memcpy_s 27230->27233 27232 7ff7ed6a1fa0 31 API calls 27231->27232 27232->27233 27234 7ff7ed6a1fa0 31 API calls 27233->27234 27235 7ff7ed6ae668 memcpy_s 27233->27235 27234->27235 27235->27169 27236->27176 27242 7ff7ed6d24a0 27237->27242 27240 7ff7ed6d24a0 33 API calls 27241 7ff7ed6a9f75 memcpy_s 27240->27241 27241->27225 27243 7ff7ed6d24d1 27242->27243 27244 7ff7ed6a9f4a 27243->27244 27246 7ff7ed6a9fb0 27243->27246 27244->27240 27249 7ff7ed6bb788 27246->27249 27248 7ff7ed6a9fc2 27248->27243 27250 7ff7ed6a13a4 33 API calls 27249->27250 27251 7ff7ed6bb7ad 27250->27251 27251->27248 27253 7ff7ed6b72cc 8 API calls 27252->27253 27254 7ff7ed6b3ee1 27253->27254 27258 7ff7ed6b3f0f 27254->27258 27296 7ff7ed6b40bc 27254->27296 27257 7ff7ed6b3efa FindClose 27257->27258 27258->27185 27260 7ff7ed6af598 _snwprintf 27259->27260 27335 7ff7ed6a2950 27260->27335 27263 7ff7ed6af5cc 27267 7ff7ed6af5fc 27263->27267 27352 7ff7ed6a33e4 27263->27352 27266 7ff7ed6af5f8 27266->27267 27384 7ff7ed6a3ad8 27266->27384 27603 7ff7ed6a2c54 27267->27603 27274 7ff7ed6af7cb 27394 7ff7ed6af8a4 27274->27394 27276 7ff7ed6a8d04 33 API calls 27277 7ff7ed6af662 27276->27277 27623 7ff7ed6b7918 48 API calls 2 library calls 27277->27623 27279 7ff7ed6af677 27280 7ff7ed6b3ec8 55 API calls 27279->27280 27288 7ff7ed6af6ad 27280->27288 27282 7ff7ed6af842 27282->27267 27415 7ff7ed6a69f8 27282->27415 27426 7ff7ed6af930 27282->27426 27287 7ff7ed6af89a 27291 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27287->27291 27288->27287 27289 7ff7ed6af74d 27288->27289 27290 7ff7ed6b3ec8 55 API calls 27288->27290 27624 7ff7ed6b7918 48 API calls 2 library calls 27288->27624 27289->27274 27289->27287 27292 7ff7ed6af895 27289->27292 27290->27288 27294 7ff7ed6af8a0 27291->27294 27293 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27292->27293 27293->27287 27295->27191 27297 7ff7ed6b41d2 FindNextFileW 27296->27297 27298 7ff7ed6b40f9 FindFirstFileW 27296->27298 27300 7ff7ed6b41e1 GetLastError 27297->27300 27301 7ff7ed6b41f3 27297->27301 27298->27301 27302 7ff7ed6b411e 27298->27302 27320 7ff7ed6b41c0 27300->27320 27303 7ff7ed6b4211 27301->27303 27305 7ff7ed6a20b0 33 API calls 27301->27305 27304 7ff7ed6b6a0c 49 API calls 27302->27304 27309 7ff7ed6a129c 33 API calls 27303->27309 27307 7ff7ed6b4144 27304->27307 27305->27303 27306 7ff7ed6d2320 _handle_error 8 API calls 27310 7ff7ed6b3ef4 27306->27310 27308 7ff7ed6b4148 FindFirstFileW 27307->27308 27311 7ff7ed6b4167 27307->27311 27308->27311 27312 7ff7ed6b423b 27309->27312 27310->27257 27310->27258 27311->27301 27313 7ff7ed6b41af GetLastError 27311->27313 27315 7ff7ed6b4314 27311->27315 27322 7ff7ed6b8090 27312->27322 27313->27320 27317 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27315->27317 27318 7ff7ed6b431a 27317->27318 27319 7ff7ed6b430f 27321 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27319->27321 27320->27306 27321->27315 27323 7ff7ed6b80a5 27322->27323 27326 7ff7ed6b8188 27323->27326 27325 7ff7ed6b4249 27325->27319 27325->27320 27327 7ff7ed6b8326 27326->27327 27331 7ff7ed6b81ba 27326->27331 27334 7ff7ed6a704c 47 API calls memcpy_s 27327->27334 27329 7ff7ed6b832b 27330 7ff7ed6b81d4 memcpy_s 27330->27325 27331->27330 27333 7ff7ed6b58a4 33 API calls 2 library calls 27331->27333 27333->27330 27334->27329 27336 7ff7ed6a296c 27335->27336 27337 7ff7ed6a9f1c 33 API calls 27336->27337 27338 7ff7ed6a2980 27337->27338 27339 7ff7ed6b86ec 33 API calls 27338->27339 27340 7ff7ed6a298d 27339->27340 27341 7ff7ed6d21d0 33 API calls 27340->27341 27342 7ff7ed6a2ac2 27340->27342 27343 7ff7ed6a2ab0 27341->27343 27632 7ff7ed6b4d04 27342->27632 27343->27342 27625 7ff7ed6a91c8 27343->27625 27347 7ff7ed6b2ca8 27661 7ff7ed6b24c0 27347->27661 27349 7ff7ed6b2cc5 27349->27263 27680 7ff7ed6b28d0 27352->27680 27353 7ff7ed6a3674 27699 7ff7ed6a28a4 82 API calls 2 library calls 27353->27699 27354 7ff7ed6a3431 memcpy_s 27361 7ff7ed6a344e 27354->27361 27365 7ff7ed6a3601 27354->27365 27685 7ff7ed6b2bb0 27354->27685 27356 7ff7ed6a69f8 132 API calls 27358 7ff7ed6a3682 27356->27358 27358->27356 27359 7ff7ed6a370c 27358->27359 27358->27365 27377 7ff7ed6b2aa0 101 API calls 27358->27377 27364 7ff7ed6a3740 27359->27364 27359->27365 27700 7ff7ed6a28a4 82 API calls 2 library calls 27359->27700 27361->27353 27361->27358 27362 7ff7ed6a35cb 27362->27361 27363 7ff7ed6a35d7 27362->27363 27363->27365 27367 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27363->27367 27364->27365 27366 7ff7ed6a384d 27364->27366 27379 7ff7ed6b2bb0 101 API calls 27364->27379 27365->27266 27366->27365 27369 7ff7ed6a20b0 33 API calls 27366->27369 27370 7ff7ed6a3891 27367->27370 27368 7ff7ed6a34eb 27368->27362 27694 7ff7ed6b2aa0 27368->27694 27369->27365 27370->27266 27372 7ff7ed6a69f8 132 API calls 27373 7ff7ed6a378e 27372->27373 27373->27372 27374 7ff7ed6a3803 27373->27374 27380 7ff7ed6b2aa0 101 API calls 27373->27380 27383 7ff7ed6b2aa0 101 API calls 27374->27383 27376 7ff7ed6b28d0 104 API calls 27376->27368 27377->27358 27378 7ff7ed6b28d0 104 API calls 27378->27362 27379->27373 27380->27373 27383->27366 27385 7ff7ed6a3af9 27384->27385 27390 7ff7ed6a3b55 27384->27390 27712 7ff7ed6a3378 27385->27712 27386 7ff7ed6d2320 _handle_error 8 API calls 27388 7ff7ed6a3b67 27386->27388 27388->27274 27388->27276 27390->27386 27391 7ff7ed6a3b6c 27392 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27391->27392 27393 7ff7ed6a3b71 27392->27393 27949 7ff7ed6b886c 27394->27949 27396 7ff7ed6af8ba 27953 7ff7ed6bef60 GetSystemTime SystemTimeToFileTime 27396->27953 27399 7ff7ed6c0994 27400 7ff7ed6d0340 27399->27400 27401 7ff7ed6b7df4 47 API calls 27400->27401 27402 7ff7ed6d0373 27401->27402 27403 7ff7ed6baae0 48 API calls 27402->27403 27404 7ff7ed6d0387 27403->27404 27405 7ff7ed6bda98 48 API calls 27404->27405 27406 7ff7ed6d0397 27405->27406 27407 7ff7ed6a1fa0 31 API calls 27406->27407 27408 7ff7ed6d03a2 27407->27408 27962 7ff7ed6cfc68 49 API calls 2 library calls 27408->27962 27410 7ff7ed6d03b8 27411 7ff7ed6a1fa0 31 API calls 27410->27411 27412 7ff7ed6d03c3 27411->27412 27413 7ff7ed6d2320 _handle_error 8 API calls 27412->27413 27414 7ff7ed6d03d0 27413->27414 27414->27282 27416 7ff7ed6a6a0a 27415->27416 27417 7ff7ed6a6a0e 27415->27417 27416->27282 27425 7ff7ed6b2bb0 101 API calls 27417->27425 27418 7ff7ed6a6a1b 27419 7ff7ed6a6a2f 27418->27419 27420 7ff7ed6a6a3e 27418->27420 27419->27416 27963 7ff7ed6a5e24 27419->27963 28025 7ff7ed6a5130 130 API calls 2 library calls 27420->28025 27423 7ff7ed6a6a3c 27423->27416 28026 7ff7ed6a466c 82 API calls 27423->28026 27425->27418 27427 7ff7ed6af978 27426->27427 27430 7ff7ed6af9b0 27427->27430 27438 7ff7ed6afa34 27427->27438 28140 7ff7ed6c612c 137 API calls 3 library calls 27427->28140 27429 7ff7ed6b1189 27431 7ff7ed6b11e1 27429->27431 27432 7ff7ed6b118e 27429->27432 27430->27429 27437 7ff7ed6af9d0 27430->27437 27430->27438 27431->27438 28189 7ff7ed6c612c 137 API calls 3 library calls 27431->28189 27432->27438 28188 7ff7ed6add08 179 API calls 27432->28188 27433 7ff7ed6d2320 _handle_error 8 API calls 27434 7ff7ed6b11c4 27433->27434 27434->27282 27437->27438 28055 7ff7ed6a9bb0 27437->28055 27438->27433 27440 7ff7ed6afad6 28068 7ff7ed6b5ef8 27440->28068 27443 7ff7ed6afb7a 27604 7ff7ed6a2c74 27603->27604 27605 7ff7ed6a2c88 27603->27605 27604->27605 28276 7ff7ed6a2d80 108 API calls _invalid_parameter_noinfo_noreturn 27604->28276 27606 7ff7ed6a1fa0 31 API calls 27605->27606 27610 7ff7ed6a2ca1 27606->27610 27609 7ff7ed6a2d08 28278 7ff7ed6a3090 31 API calls _invalid_parameter_noinfo_noreturn 27609->28278 27622 7ff7ed6a2d64 27610->27622 28277 7ff7ed6a3090 31 API calls _invalid_parameter_noinfo_noreturn 27610->28277 27612 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27613 7ff7ed6a2d7c 27612->27613 27614 7ff7ed6a2d14 27615 7ff7ed6a1fa0 31 API calls 27614->27615 27616 7ff7ed6a2d20 27615->27616 28279 7ff7ed6b878c 27616->28279 27622->27612 27623->27279 27624->27288 27642 7ff7ed6b56a4 27625->27642 27627 7ff7ed6a91df 27628 7ff7ed6bb788 33 API calls 27627->27628 27629 7ff7ed6a9365 27628->27629 27645 7ff7ed6a9a28 27629->27645 27631 7ff7ed6a9383 27631->27342 27633 7ff7ed6b4d32 memcpy_s 27632->27633 27657 7ff7ed6b4bac 27633->27657 27635 7ff7ed6b4d54 27636 7ff7ed6b4d90 27635->27636 27638 7ff7ed6b4dae 27635->27638 27637 7ff7ed6d2320 _handle_error 8 API calls 27636->27637 27639 7ff7ed6a2b32 27637->27639 27640 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27638->27640 27639->27263 27639->27347 27641 7ff7ed6b4db3 27640->27641 27648 7ff7ed6b56e8 27642->27648 27646 7ff7ed6b56e8 2 API calls 27645->27646 27647 7ff7ed6a9a36 27646->27647 27647->27631 27649 7ff7ed6b56fe memcpy_s 27648->27649 27652 7ff7ed6beba4 27649->27652 27655 7ff7ed6beb58 GetCurrentProcess GetProcessAffinityMask 27652->27655 27654 7ff7ed6b56de 27654->27627 27656 7ff7ed6beb7e 27655->27656 27656->27654 27656->27656 27658 7ff7ed6b4c27 27657->27658 27660 7ff7ed6b4c2f memcpy_s 27657->27660 27659 7ff7ed6a1fa0 31 API calls 27658->27659 27659->27660 27660->27635 27662 7ff7ed6b24fd CreateFileW 27661->27662 27664 7ff7ed6b25ae GetLastError 27662->27664 27672 7ff7ed6b266e 27662->27672 27665 7ff7ed6b6a0c 49 API calls 27664->27665 27666 7ff7ed6b25dc 27665->27666 27667 7ff7ed6b25e0 CreateFileW GetLastError 27666->27667 27671 7ff7ed6b262c 27666->27671 27667->27671 27668 7ff7ed6b26b1 SetFileTime 27674 7ff7ed6b26cf 27668->27674 27669 7ff7ed6b2708 27670 7ff7ed6d2320 _handle_error 8 API calls 27669->27670 27673 7ff7ed6b271b 27670->27673 27671->27672 27676 7ff7ed6b2736 27671->27676 27672->27668 27672->27674 27673->27349 27679 7ff7ed6ab7e8 99 API calls 2 library calls 27673->27679 27674->27669 27675 7ff7ed6a20b0 33 API calls 27674->27675 27675->27669 27677 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27676->27677 27678 7ff7ed6b273b 27677->27678 27679->27349 27681 7ff7ed6b28f6 27680->27681 27682 7ff7ed6b28fd 27680->27682 27681->27354 27682->27681 27684 7ff7ed6b2320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27682->27684 27701 7ff7ed6ab8a4 99 API calls std::_Xinvalid_argument 27682->27701 27684->27682 27686 7ff7ed6b2bcd 27685->27686 27687 7ff7ed6b2be9 27685->27687 27690 7ff7ed6a34cc 27686->27690 27702 7ff7ed6ab9c4 99 API calls std::_Xinvalid_argument 27686->27702 27689 7ff7ed6b2c01 SetFilePointer 27687->27689 27687->27690 27689->27690 27691 7ff7ed6b2c1e GetLastError 27689->27691 27690->27376 27691->27690 27692 7ff7ed6b2c28 27691->27692 27692->27690 27703 7ff7ed6ab9c4 99 API calls std::_Xinvalid_argument 27692->27703 27704 7ff7ed6b2778 27694->27704 27697 7ff7ed6a35a7 27697->27362 27697->27378 27699->27365 27700->27364 27705 7ff7ed6b2789 _snwprintf 27704->27705 27706 7ff7ed6b2890 SetFilePointer 27705->27706 27710 7ff7ed6b27b5 27705->27710 27708 7ff7ed6b28b8 GetLastError 27706->27708 27706->27710 27707 7ff7ed6d2320 _handle_error 8 API calls 27709 7ff7ed6b281d 27707->27709 27708->27710 27709->27697 27711 7ff7ed6ab9c4 99 API calls std::_Xinvalid_argument 27709->27711 27710->27707 27713 7ff7ed6a3396 27712->27713 27714 7ff7ed6a339a 27712->27714 27713->27390 27713->27391 27718 7ff7ed6a3294 27714->27718 27717 7ff7ed6b2aa0 101 API calls 27717->27713 27719 7ff7ed6a32bb 27718->27719 27721 7ff7ed6a32f6 27718->27721 27720 7ff7ed6a69f8 132 API calls 27719->27720 27722 7ff7ed6a32db 27720->27722 27726 7ff7ed6a6e74 27721->27726 27722->27717 27727 7ff7ed6a6e95 27726->27727 27728 7ff7ed6a69f8 132 API calls 27727->27728 27730 7ff7ed6a331d 27727->27730 27758 7ff7ed6be808 27727->27758 27728->27727 27730->27722 27731 7ff7ed6a3904 27730->27731 27766 7ff7ed6a6a7c 27731->27766 27734 7ff7ed6a396a 27738 7ff7ed6a399a 27734->27738 27739 7ff7ed6a3989 27734->27739 27735 7ff7ed6a3a8a 27740 7ff7ed6d2320 _handle_error 8 API calls 27735->27740 27737 7ff7ed6a394f 27737->27735 27743 7ff7ed6a3ab3 27737->27743 27748 7ff7ed6a3ab8 27737->27748 27741 7ff7ed6a39a3 27738->27741 27742 7ff7ed6a39ec 27738->27742 27798 7ff7ed6c0d54 27739->27798 27745 7ff7ed6a3a9e 27740->27745 27803 7ff7ed6c0c80 33 API calls 27741->27803 27804 7ff7ed6a26b4 33 API calls memcpy_s 27742->27804 27746 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27743->27746 27745->27722 27746->27748 27751 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27748->27751 27749 7ff7ed6a39b0 27752 7ff7ed6a1fa0 31 API calls 27749->27752 27757 7ff7ed6a39c0 memcpy_s 27749->27757 27756 7ff7ed6a3abe 27751->27756 27752->27757 27753 7ff7ed6a1fa0 31 API calls 27753->27737 27754 7ff7ed6a3a13 27805 7ff7ed6c0ae8 34 API calls _invalid_parameter_noinfo_noreturn 27754->27805 27757->27753 27759 7ff7ed6be811 27758->27759 27760 7ff7ed6be82b 27759->27760 27764 7ff7ed6ab664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27759->27764 27762 7ff7ed6be845 SetThreadExecutionState 27760->27762 27765 7ff7ed6ab664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27760->27765 27764->27760 27765->27762 27767 7ff7ed6a6a96 _snwprintf 27766->27767 27768 7ff7ed6a6ae4 27767->27768 27769 7ff7ed6a6ac4 27767->27769 27771 7ff7ed6a6d4d 27768->27771 27774 7ff7ed6a6b0f 27768->27774 27844 7ff7ed6a28a4 82 API calls 2 library calls 27769->27844 27873 7ff7ed6a28a4 82 API calls 2 library calls 27771->27873 27773 7ff7ed6a6ad0 27775 7ff7ed6d2320 _handle_error 8 API calls 27773->27775 27774->27773 27806 7ff7ed6c1f94 27774->27806 27776 7ff7ed6a394b 27775->27776 27776->27734 27776->27737 27802 7ff7ed6a2794 33 API calls __std_swap_ranges_trivially_swappable 27776->27802 27779 7ff7ed6a6b85 27780 7ff7ed6a6c2a 27779->27780 27797 7ff7ed6a6b7b 27779->27797 27850 7ff7ed6b8968 109 API calls 27779->27850 27815 7ff7ed6b4760 27780->27815 27781 7ff7ed6a6b80 27781->27779 27846 7ff7ed6a40b0 27781->27846 27782 7ff7ed6a6b6e 27845 7ff7ed6a28a4 82 API calls 2 library calls 27782->27845 27788 7ff7ed6a6c52 27789 7ff7ed6a6cd1 27788->27789 27790 7ff7ed6a6cc7 27788->27790 27851 7ff7ed6c1f20 27789->27851 27819 7ff7ed6b1794 27790->27819 27793 7ff7ed6a6ccf 27871 7ff7ed6b4700 8 API calls _handle_error 27793->27871 27834 7ff7ed6c1870 27797->27834 27801 7ff7ed6c0d8c 27798->27801 27799 7ff7ed6c0f48 27799->27737 27800 7ff7ed6a1744 33 API calls 27800->27801 27801->27799 27801->27800 27802->27734 27803->27749 27804->27754 27805->27737 27807 7ff7ed6c2056 std::bad_alloc::bad_alloc 27806->27807 27810 7ff7ed6c1fc5 std::bad_alloc::bad_alloc 27806->27810 27874 7ff7ed6d4078 27807->27874 27808 7ff7ed6a6b59 27808->27779 27808->27781 27808->27782 27810->27808 27811 7ff7ed6d4078 std::_Xinvalid_argument 2 API calls 27810->27811 27812 7ff7ed6c200f std::bad_alloc::bad_alloc 27810->27812 27811->27812 27812->27808 27813 7ff7ed6d4078 std::_Xinvalid_argument 2 API calls 27812->27813 27814 7ff7ed6c20a9 27813->27814 27816 7ff7ed6b4780 27815->27816 27818 7ff7ed6b478a 27815->27818 27817 7ff7ed6d21d0 33 API calls 27816->27817 27817->27818 27818->27788 27820 7ff7ed6b17be memcpy_s 27819->27820 27879 7ff7ed6b8a48 27820->27879 27823 7ff7ed6b17f2 27835 7ff7ed6c188e 27834->27835 27837 7ff7ed6c18a1 27835->27837 27899 7ff7ed6be948 27835->27899 27841 7ff7ed6c18d8 27837->27841 27895 7ff7ed6d236c 27837->27895 27839 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27840 7ff7ed6c1ad0 27839->27840 27843 7ff7ed6c1a37 27841->27843 27906 7ff7ed6ba984 31 API calls _invalid_parameter_noinfo_noreturn 27841->27906 27843->27839 27844->27773 27845->27797 27847 7ff7ed6a40dd 27846->27847 27848 7ff7ed6a40d7 memcpy_s 27846->27848 27847->27848 27907 7ff7ed6a4120 27847->27907 27848->27779 27850->27780 27852 7ff7ed6c1f29 27851->27852 27853 7ff7ed6c1f5d 27852->27853 27854 7ff7ed6c1f55 27852->27854 27855 7ff7ed6c1f49 27852->27855 27853->27793 27945 7ff7ed6c3964 151 API calls 27854->27945 27913 7ff7ed6c20ac 27855->27913 27873->27773 27875 7ff7ed6d40b4 RtlPcToFileHeader 27874->27875 27876 7ff7ed6d4097 27874->27876 27877 7ff7ed6d40db RaiseException 27875->27877 27878 7ff7ed6d40cc 27875->27878 27876->27875 27877->27810 27878->27877 27881 7ff7ed6b8bcd 27879->27881 27884 7ff7ed6b8a91 memcpy_s 27879->27884 27880 7ff7ed6b8c1a 27882 7ff7ed6be808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27880->27882 27881->27880 27883 7ff7ed6aa174 8 API calls 27881->27883 27886 7ff7ed6b8c1f 27882->27886 27883->27880 27884->27881 27885 7ff7ed6c612c 137 API calls 27884->27885 27884->27886 27887 7ff7ed6b4888 108 API calls 27884->27887 27888 7ff7ed6b28d0 104 API calls 27884->27888 27885->27884 27886->27823 27887->27884 27888->27884 27896 7ff7ed6d239f 27895->27896 27897 7ff7ed6d23c8 27896->27897 27898 7ff7ed6c1870 108 API calls 27896->27898 27897->27841 27898->27896 27900 7ff7ed6becd8 103 API calls 27899->27900 27901 7ff7ed6be95f ReleaseSemaphore 27900->27901 27902 7ff7ed6be984 27901->27902 27903 7ff7ed6be9a3 DeleteCriticalSection CloseHandle CloseHandle 27901->27903 27904 7ff7ed6bea5c 101 API calls 27902->27904 27905 7ff7ed6be98e CloseHandle 27904->27905 27905->27902 27905->27903 27906->27843 27910 7ff7ed6a4149 27907->27910 27912 7ff7ed6a4168 memcpy_s __std_swap_ranges_trivially_swappable 27907->27912 27908 7ff7ed6a2018 33 API calls 27909 7ff7ed6a41eb 27908->27909 27911 7ff7ed6d21d0 33 API calls 27910->27911 27910->27912 27911->27912 27912->27908 27915 7ff7ed6c20c8 memcpy_s 27913->27915 27914 7ff7ed6c21ba 27915->27914 27916 7ff7ed6d24a0 33 API calls 27915->27916 27917 7ff7ed6c2155 memcpy_s 27915->27917 27916->27917 27917->27914 27945->27853 27950 7ff7ed6b8882 27949->27950 27951 7ff7ed6b8892 27949->27951 27956 7ff7ed6b23f0 27950->27956 27951->27396 27954 7ff7ed6d2320 _handle_error 8 API calls 27953->27954 27955 7ff7ed6af7dc 27954->27955 27955->27282 27955->27399 27957 7ff7ed6b240f 27956->27957 27960 7ff7ed6b2aa0 101 API calls 27957->27960 27958 7ff7ed6b2428 27961 7ff7ed6b2bb0 101 API calls 27958->27961 27959 7ff7ed6b2438 27959->27951 27960->27958 27961->27959 27962->27410 27964 7ff7ed6a5e67 27963->27964 28027 7ff7ed6b85f0 27964->28027 27966 7ff7ed6a6134 28037 7ff7ed6a6fcc 82 API calls 27966->28037 27968 7ff7ed6a69af 27969 7ff7ed6d2320 _handle_error 8 API calls 27968->27969 27970 7ff7ed6a69e4 27974 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27970->27974 27971 7ff7ed6a6973 28049 7ff7ed6a466c 82 API calls 27971->28049 27973 7ff7ed6a612e 27973->27966 27973->27971 27977 7ff7ed6b85f0 104 API calls 27973->27977 27979 7ff7ed6a61a4 27977->27979 27979->27966 27983 7ff7ed6a61ac 27979->27983 27980 7ff7ed6a69ef 27981 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 27980->27981 27984 7ff7ed6a623f 27983->27984 28038 7ff7ed6a466c 82 API calls 27983->28038 27984->27971 28011 7ff7ed6a613c 28011->27968 28011->27970 28011->27980 28025->27423 28028 7ff7ed6b8614 28027->28028 28029 7ff7ed6b869a 28027->28029 28030 7ff7ed6b867c 28028->28030 28032 7ff7ed6a40b0 33 API calls 28028->28032 28029->28030 28031 7ff7ed6a40b0 33 API calls 28029->28031 28030->27973 28033 7ff7ed6b86b3 28031->28033 28034 7ff7ed6b864d 28032->28034 28036 7ff7ed6b28d0 104 API calls 28033->28036 28050 7ff7ed6aa174 28034->28050 28036->28030 28037->28011 28051 7ff7ed6aa185 28050->28051 28052 7ff7ed6aa19a 28051->28052 28054 7ff7ed6baf18 8 API calls 2 library calls 28051->28054 28052->28030 28054->28052 28063 7ff7ed6a9be7 28055->28063 28056 7ff7ed6a9c1b 28057 7ff7ed6d2320 _handle_error 8 API calls 28056->28057 28058 7ff7ed6a9c9d 28057->28058 28058->27440 28060 7ff7ed6a9c83 28061 7ff7ed6a1fa0 31 API calls 28060->28061 28061->28056 28063->28056 28063->28060 28064 7ff7ed6a9cae 28063->28064 28190 7ff7ed6b5294 28063->28190 28208 7ff7ed6bdb60 28063->28208 28065 7ff7ed6a9cbf 28064->28065 28212 7ff7ed6bda48 CompareStringW 28064->28212 28065->28060 28067 7ff7ed6a20b0 33 API calls 28065->28067 28067->28060 28078 7ff7ed6b5f3a 28068->28078 28069 7ff7ed6b619b 28070 7ff7ed6d2320 _handle_error 8 API calls 28069->28070 28072 7ff7ed6afb29 28070->28072 28071 7ff7ed6b61ce 28216 7ff7ed6a704c 47 API calls memcpy_s 28071->28216 28072->27443 28141 7ff7ed6b7c94 47 API calls 2 library calls 28072->28141 28074 7ff7ed6a129c 33 API calls 28076 7ff7ed6b6129 28074->28076 28075 7ff7ed6b61d4 28077 7ff7ed6a1fa0 31 API calls 28076->28077 28079 7ff7ed6b613b memcpy_s 28076->28079 28077->28079 28078->28069 28078->28071 28078->28074 28079->28069 28080 7ff7ed6b61c9 28079->28080 28140->27430 28188->27438 28189->27438 28191 7ff7ed6b52d4 28190->28191 28195 7ff7ed6b5339 __vcrt_InitializeCriticalSectionEx 28191->28195 28196 7ff7ed6b5312 __vcrt_InitializeCriticalSectionEx 28191->28196 28213 7ff7ed6c13f4 CompareStringW 28191->28213 28192 7ff7ed6d2320 _handle_error 8 API calls 28193 7ff7ed6b5503 28192->28193 28193->28063 28195->28192 28196->28195 28197 7ff7ed6b5382 __vcrt_InitializeCriticalSectionEx 28196->28197 28214 7ff7ed6c13f4 CompareStringW 28196->28214 28197->28195 28199 7ff7ed6a129c 33 API calls 28197->28199 28200 7ff7ed6b5439 28197->28200 28201 7ff7ed6b5426 28199->28201 28203 7ff7ed6b551b 28200->28203 28204 7ff7ed6b5489 28200->28204 28202 7ff7ed6b72cc 8 API calls 28201->28202 28202->28200 28206 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28203->28206 28204->28195 28215 7ff7ed6c13f4 CompareStringW 28204->28215 28207 7ff7ed6b5520 28206->28207 28209 7ff7ed6bdb73 28208->28209 28210 7ff7ed6a20b0 33 API calls 28209->28210 28211 7ff7ed6bdb91 28209->28211 28210->28211 28211->28063 28212->28065 28213->28196 28214->28197 28215->28195 28216->28075 28276->27605 28277->27609 28278->27614 28280 7ff7ed6b87af 28279->28280 28289 7ff7ed6b87df 28279->28289 28281 7ff7ed6d236c 108 API calls 28280->28281 28283 7ff7ed6b87ca 28281->28283 28282 7ff7ed6b882b 28293 7ff7ed6b461c 28282->28293 28286 7ff7ed6d236c 108 API calls 28283->28286 28284 7ff7ed6d236c 108 API calls 28287 7ff7ed6b8814 28284->28287 28286->28289 28290 7ff7ed6d236c 108 API calls 28287->28290 28288 7ff7ed6b8845 28291 7ff7ed6b461c 108 API calls 28288->28291 28289->28282 28289->28284 28290->28282 28292 7ff7ed6b8851 28291->28292 28294 7ff7ed6b4632 28293->28294 28296 7ff7ed6b463a 28293->28296 28295 7ff7ed6be948 108 API calls 28294->28295 28295->28296 28296->28288 28298 7ff7ed6b163e 28297->28298 28301 7ff7ed6b1681 28297->28301 28298->28301 28302 7ff7ed6b31bc 51 API calls 28298->28302 28299 7ff7ed6a1fa0 31 API calls 28299->28301 28300 7ff7ed6ae600 31 API calls 28303 7ff7ed6b16de 28300->28303 28301->28299 28306 7ff7ed6b16a0 28301->28306 28302->28298 28304 7ff7ed6b175b 28303->28304 28307 7ff7ed6b178d 28303->28307 28305 7ff7ed6d2320 _handle_error 8 API calls 28304->28305 28308 7ff7ed6ae58a 28305->28308 28306->28300 28309 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28307->28309 28308->27201 28308->27202 28310 7ff7ed6b1792 28309->28310 28312 7ff7ed6c84cc 4 API calls 28311->28312 28313 7ff7ed6c84aa 28312->28313 28314 7ff7ed6c84b9 28313->28314 28323 7ff7ed6c8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28313->28323 28314->26541 28314->26542 28316->26547 28317->26553 28319 7ff7ed6c84de 28318->28319 28320 7ff7ed6c84e3 28318->28320 28324 7ff7ed6c8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28319->28324 28320->26553 28322->26556 28323->28314 28324->28320 28325->26577 28327->26606 28328->26622 28329->26629 28331->26634 28333 7ff7ed6d1491 28334 7ff7ed6d13c9 28333->28334 28334->28333 28335 7ff7ed6d1900 _com_raise_error 14 API calls 28334->28335 28335->28334 28384 7ff7ed6d2d6c 28409 7ff7ed6d27fc 28384->28409 28387 7ff7ed6d2eb8 28507 7ff7ed6d3170 7 API calls 2 library calls 28387->28507 28388 7ff7ed6d2d88 __scrt_acquire_startup_lock 28390 7ff7ed6d2ec2 28388->28390 28392 7ff7ed6d2da6 28388->28392 28508 7ff7ed6d3170 7 API calls 2 library calls 28390->28508 28393 7ff7ed6d2de8 __scrt_release_startup_lock 28392->28393 28394 7ff7ed6d2dcb 28392->28394 28417 7ff7ed6dcd90 28392->28417 28397 7ff7ed6d2e51 28393->28397 28504 7ff7ed6dc050 35 API calls __GSHandlerCheck_EH 28393->28504 28395 7ff7ed6d2ecd abort 28421 7ff7ed6d32bc 28397->28421 28399 7ff7ed6d2e56 28424 7ff7ed6dcd20 28399->28424 28509 7ff7ed6d2fb0 28409->28509 28412 7ff7ed6d282b 28511 7ff7ed6dcc50 28412->28511 28413 7ff7ed6d2827 28413->28387 28413->28388 28418 7ff7ed6dcdcc 28417->28418 28419 7ff7ed6dcdeb 28417->28419 28418->28419 28528 7ff7ed6a1120 28418->28528 28419->28393 28422 7ff7ed6d3cf0 memcpy_s 28421->28422 28423 7ff7ed6d32d3 GetStartupInfoW 28422->28423 28423->28399 28534 7ff7ed6e0730 28424->28534 28426 7ff7ed6dcd2f 28427 7ff7ed6d2e5e 28426->28427 28538 7ff7ed6e0ac0 35 API calls _snwprintf 28426->28538 28429 7ff7ed6d0754 28427->28429 28540 7ff7ed6bdfd0 28429->28540 28432 7ff7ed6b62dc 35 API calls 28433 7ff7ed6d079a 28432->28433 28617 7ff7ed6c946c 28433->28617 28435 7ff7ed6d07a4 memcpy_s 28622 7ff7ed6c9a14 28435->28622 28437 7ff7ed6d0ddc 28440 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28437->28440 28438 7ff7ed6d096e GetCommandLineW 28442 7ff7ed6d0980 28438->28442 28443 7ff7ed6d0b42 28438->28443 28439 7ff7ed6d0819 28439->28437 28439->28438 28441 7ff7ed6d0de2 28440->28441 28445 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28441->28445 28447 7ff7ed6a129c 33 API calls 28442->28447 28444 7ff7ed6b6454 34 API calls 28443->28444 28446 7ff7ed6d0b51 28444->28446 28457 7ff7ed6d0de8 28445->28457 28448 7ff7ed6a1fa0 31 API calls 28446->28448 28451 7ff7ed6d0b68 memcpy_s 28446->28451 28450 7ff7ed6d09a5 28447->28450 28448->28451 28449 7ff7ed6a1fa0 31 API calls 28452 7ff7ed6d0b93 SetEnvironmentVariableW GetLocalTime 28449->28452 28663 7ff7ed6ccad0 102 API calls 3 library calls 28450->28663 28451->28449 28455 7ff7ed6b3e28 swprintf 46 API calls 28452->28455 28454 7ff7ed6d1900 _com_raise_error 14 API calls 28454->28457 28458 7ff7ed6d0c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28455->28458 28456 7ff7ed6d09af 28456->28441 28459 7ff7ed6d0adb 28456->28459 28460 7ff7ed6d09f9 OpenFileMappingW 28456->28460 28457->28454 28632 7ff7ed6cb014 LoadBitmapW 28458->28632 28467 7ff7ed6a129c 33 API calls 28459->28467 28462 7ff7ed6d0ad0 CloseHandle 28460->28462 28463 7ff7ed6d0a19 MapViewOfFile 28460->28463 28462->28443 28463->28462 28465 7ff7ed6d0a3f UnmapViewOfFile MapViewOfFile 28463->28465 28465->28462 28468 7ff7ed6d0a71 28465->28468 28470 7ff7ed6d0b00 28467->28470 28664 7ff7ed6ca190 33 API calls 2 library calls 28468->28664 28469 7ff7ed6d0c75 28656 7ff7ed6c67b4 28469->28656 28668 7ff7ed6cfd0c 35 API calls 2 library calls 28470->28668 28474 7ff7ed6d0a81 28665 7ff7ed6cfd0c 35 API calls 2 library calls 28474->28665 28476 7ff7ed6c67b4 33 API calls 28479 7ff7ed6d0c87 DialogBoxParamW 28476->28479 28477 7ff7ed6d0b0a 28477->28443 28482 7ff7ed6d0dd7 28477->28482 28486 7ff7ed6d0cd3 28479->28486 28480 7ff7ed6d0a90 28666 7ff7ed6bb9b4 102 API calls 28480->28666 28484 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28482->28484 28483 7ff7ed6d0aa5 28667 7ff7ed6bbb00 102 API calls 28483->28667 28484->28437 28488 7ff7ed6d0ce6 Sleep 28486->28488 28489 7ff7ed6d0cec 28486->28489 28487 7ff7ed6d0ab8 28490 7ff7ed6d0ac7 UnmapViewOfFile 28487->28490 28488->28489 28491 7ff7ed6d0cfa 28489->28491 28669 7ff7ed6c9f4c 49 API calls 2 library calls 28489->28669 28490->28462 28493 7ff7ed6d0d06 DeleteObject 28491->28493 28494 7ff7ed6d0d25 28493->28494 28495 7ff7ed6d0d1f DeleteObject 28493->28495 28496 7ff7ed6d0d5b 28494->28496 28500 7ff7ed6d0d6d 28494->28500 28495->28494 28670 7ff7ed6cfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28496->28670 28498 7ff7ed6d0d60 CloseHandle 28498->28500 28659 7ff7ed6c94e4 28500->28659 28504->28397 28507->28390 28508->28395 28510 7ff7ed6d281e __scrt_dllmain_crt_thread_attach 28509->28510 28510->28412 28510->28413 28512 7ff7ed6e0d4c 28511->28512 28513 7ff7ed6d2830 28512->28513 28516 7ff7ed6dec00 28512->28516 28513->28413 28515 7ff7ed6d51a0 7 API calls 2 library calls 28513->28515 28515->28413 28527 7ff7ed6df398 EnterCriticalSection 28516->28527 28529 7ff7ed6a91c8 35 API calls 28528->28529 28530 7ff7ed6a1130 28529->28530 28533 7ff7ed6d29bc 34 API calls 28530->28533 28532 7ff7ed6d2a01 28532->28418 28533->28532 28535 7ff7ed6e0749 28534->28535 28536 7ff7ed6e073d 28534->28536 28535->28426 28539 7ff7ed6e0570 48 API calls 4 library calls 28536->28539 28538->28426 28539->28535 28671 7ff7ed6d2450 28540->28671 28543 7ff7ed6be026 GetProcAddress 28546 7ff7ed6be053 GetProcAddress 28543->28546 28547 7ff7ed6be03b 28543->28547 28544 7ff7ed6be07b 28545 7ff7ed6be503 28544->28545 28678 7ff7ed6db788 39 API calls _snwprintf 28544->28678 28549 7ff7ed6b6454 34 API calls 28545->28549 28546->28544 28550 7ff7ed6be068 28546->28550 28547->28546 28552 7ff7ed6be50c 28549->28552 28550->28544 28551 7ff7ed6be3b0 28551->28545 28553 7ff7ed6be3ba 28551->28553 28554 7ff7ed6b7df4 47 API calls 28552->28554 28555 7ff7ed6b6454 34 API calls 28553->28555 28571 7ff7ed6be51a 28554->28571 28556 7ff7ed6be3c3 CreateFileW 28555->28556 28558 7ff7ed6be4f0 CloseHandle 28556->28558 28559 7ff7ed6be403 SetFilePointer 28556->28559 28561 7ff7ed6a1fa0 31 API calls 28558->28561 28559->28558 28560 7ff7ed6be41c ReadFile 28559->28560 28560->28558 28562 7ff7ed6be444 28560->28562 28561->28545 28563 7ff7ed6be800 28562->28563 28564 7ff7ed6be458 28562->28564 28684 7ff7ed6d2624 8 API calls 28563->28684 28569 7ff7ed6a129c 33 API calls 28564->28569 28566 7ff7ed6be805 28567 7ff7ed6be53e CompareStringW 28567->28571 28568 7ff7ed6a129c 33 API calls 28568->28571 28580 7ff7ed6be48f 28569->28580 28570 7ff7ed6b8090 47 API calls 28570->28571 28571->28567 28571->28568 28571->28570 28573 7ff7ed6a1fa0 31 API calls 28571->28573 28576 7ff7ed6b32bc 51 API calls 28571->28576 28601 7ff7ed6be5cc 28571->28601 28673 7ff7ed6b51a4 28571->28673 28573->28571 28574 7ff7ed6be7c2 28579 7ff7ed6a1fa0 31 API calls 28574->28579 28575 7ff7ed6be648 28680 7ff7ed6b7eb0 47 API calls 28575->28680 28576->28571 28577 7ff7ed6be4db 28581 7ff7ed6a1fa0 31 API calls 28577->28581 28583 7ff7ed6be7cb 28579->28583 28580->28577 28679 7ff7ed6bd0a0 33 API calls 28580->28679 28584 7ff7ed6be4e5 28581->28584 28582 7ff7ed6be651 28585 7ff7ed6b51a4 9 API calls 28582->28585 28587 7ff7ed6a1fa0 31 API calls 28583->28587 28588 7ff7ed6a1fa0 31 API calls 28584->28588 28589 7ff7ed6be656 28585->28589 28586 7ff7ed6a129c 33 API calls 28586->28601 28590 7ff7ed6be7d5 28587->28590 28588->28558 28591 7ff7ed6be706 28589->28591 28598 7ff7ed6be661 28589->28598 28593 7ff7ed6d2320 _handle_error 8 API calls 28590->28593 28595 7ff7ed6bda98 48 API calls 28591->28595 28592 7ff7ed6b8090 47 API calls 28592->28601 28594 7ff7ed6be7e4 28593->28594 28594->28432 28596 7ff7ed6be74b AllocConsole 28595->28596 28599 7ff7ed6be6fb 28596->28599 28600 7ff7ed6be755 GetCurrentProcessId AttachConsole 28596->28600 28597 7ff7ed6a1fa0 31 API calls 28597->28601 28604 7ff7ed6baae0 48 API calls 28598->28604 28683 7ff7ed6a19e0 31 API calls _invalid_parameter_noinfo_noreturn 28599->28683 28602 7ff7ed6be76c 28600->28602 28601->28586 28601->28592 28601->28597 28603 7ff7ed6b32bc 51 API calls 28601->28603 28607 7ff7ed6be63a 28601->28607 28610 7ff7ed6be778 GetStdHandle WriteConsoleW Sleep FreeConsole 28602->28610 28603->28601 28606 7ff7ed6be6a5 28604->28606 28609 7ff7ed6bda98 48 API calls 28606->28609 28607->28574 28607->28575 28608 7ff7ed6be7b9 ExitProcess 28611 7ff7ed6be6c3 28609->28611 28610->28599 28612 7ff7ed6baae0 48 API calls 28611->28612 28613 7ff7ed6be6ce 28612->28613 28681 7ff7ed6bdc2c 33 API calls 28613->28681 28615 7ff7ed6be6da 28682 7ff7ed6a19e0 31 API calls _invalid_parameter_noinfo_noreturn 28615->28682 28618 7ff7ed6bdd88 28617->28618 28619 7ff7ed6c9481 OleInitialize 28618->28619 28620 7ff7ed6c94a7 28619->28620 28621 7ff7ed6c94cd SHGetMalloc 28620->28621 28621->28435 28623 7ff7ed6c9a49 28622->28623 28625 7ff7ed6c9a4e memcpy_s 28622->28625 28624 7ff7ed6a1fa0 31 API calls 28623->28624 28624->28625 28626 7ff7ed6a1fa0 31 API calls 28625->28626 28627 7ff7ed6c9a7d memcpy_s 28625->28627 28626->28627 28628 7ff7ed6a1fa0 31 API calls 28627->28628 28629 7ff7ed6c9aac memcpy_s 28627->28629 28628->28629 28630 7ff7ed6a1fa0 31 API calls 28629->28630 28631 7ff7ed6c9adb memcpy_s 28629->28631 28630->28631 28631->28439 28633 7ff7ed6cb03e 28632->28633 28634 7ff7ed6cb046 28632->28634 28685 7ff7ed6c8624 FindResourceExW 28633->28685 28636 7ff7ed6cb063 28634->28636 28637 7ff7ed6cb04e GetObjectW 28634->28637 28638 7ff7ed6c849c 4 API calls 28636->28638 28637->28636 28639 7ff7ed6cb078 28638->28639 28640 7ff7ed6cb0ce 28639->28640 28641 7ff7ed6cb09e 28639->28641 28642 7ff7ed6c8624 11 API calls 28639->28642 28651 7ff7ed6b98ac 28640->28651 28700 7ff7ed6c8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28641->28700 28644 7ff7ed6cb08a 28642->28644 28644->28641 28646 7ff7ed6cb092 DeleteObject 28644->28646 28645 7ff7ed6cb0a7 28647 7ff7ed6c84cc 4 API calls 28645->28647 28646->28641 28648 7ff7ed6cb0b2 28647->28648 28701 7ff7ed6c8df4 16 API calls _handle_error 28648->28701 28650 7ff7ed6cb0bf DeleteObject 28650->28640 28702 7ff7ed6b98dc 28651->28702 28653 7ff7ed6b98ba 28769 7ff7ed6ba43c GetModuleHandleW FindResourceW 28653->28769 28655 7ff7ed6b98c2 28655->28469 28657 7ff7ed6d21d0 33 API calls 28656->28657 28658 7ff7ed6c67fa 28657->28658 28658->28476 28660 7ff7ed6c9501 28659->28660 28661 7ff7ed6c950a OleUninitialize 28660->28661 28662 7ff7ed70e330 28661->28662 28663->28456 28664->28474 28665->28480 28666->28483 28667->28487 28668->28477 28669->28491 28670->28498 28672 7ff7ed6bdff4 GetModuleHandleW 28671->28672 28672->28543 28672->28544 28674 7ff7ed6b51c8 GetVersionExW 28673->28674 28675 7ff7ed6b51fb 28673->28675 28674->28675 28676 7ff7ed6d2320 _handle_error 8 API calls 28675->28676 28677 7ff7ed6b5228 28676->28677 28677->28571 28678->28551 28679->28580 28680->28582 28681->28615 28682->28599 28683->28608 28684->28566 28686 7ff7ed6c864f SizeofResource 28685->28686 28687 7ff7ed6c879b 28685->28687 28686->28687 28688 7ff7ed6c8669 LoadResource 28686->28688 28687->28634 28688->28687 28689 7ff7ed6c8682 LockResource 28688->28689 28689->28687 28690 7ff7ed6c8697 GlobalAlloc 28689->28690 28690->28687 28691 7ff7ed6c86b8 GlobalLock 28690->28691 28692 7ff7ed6c8792 GlobalFree 28691->28692 28693 7ff7ed6c86ca memcpy_s 28691->28693 28692->28687 28694 7ff7ed6c86d8 CreateStreamOnHGlobal 28693->28694 28695 7ff7ed6c86f6 GdipAlloc 28694->28695 28696 7ff7ed6c8789 GlobalUnlock 28694->28696 28697 7ff7ed6c870b 28695->28697 28696->28692 28697->28696 28698 7ff7ed6c8772 28697->28698 28699 7ff7ed6c875a GdipCreateHBITMAPFromBitmap 28697->28699 28698->28696 28699->28698 28700->28645 28701->28650 28705 7ff7ed6b98fe _snwprintf 28702->28705 28703 7ff7ed6b9973 28779 7ff7ed6b68b0 48 API calls 28703->28779 28705->28703 28707 7ff7ed6b9a89 28705->28707 28706 7ff7ed6a1fa0 31 API calls 28709 7ff7ed6b99fd 28706->28709 28707->28709 28710 7ff7ed6a20b0 33 API calls 28707->28710 28708 7ff7ed6b997d memcpy_s 28708->28706 28767 7ff7ed6ba42e 28708->28767 28712 7ff7ed6b24c0 54 API calls 28709->28712 28710->28709 28711 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28713 7ff7ed6ba434 28711->28713 28714 7ff7ed6b9a1a 28712->28714 28716 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28713->28716 28715 7ff7ed6b9a22 28714->28715 28723 7ff7ed6b9aad 28714->28723 28717 7ff7ed6b204c 100 API calls 28715->28717 28719 7ff7ed6ba43a 28716->28719 28720 7ff7ed6b9a2b 28717->28720 28718 7ff7ed6b9b17 28771 7ff7ed6da450 28718->28771 28720->28713 28722 7ff7ed6b9a66 28720->28722 28726 7ff7ed6d2320 _handle_error 8 API calls 28722->28726 28723->28718 28728 7ff7ed6b8e58 33 API calls 28723->28728 28725 7ff7ed6da450 31 API calls 28739 7ff7ed6b9b57 __vcrt_InitializeCriticalSectionEx 28725->28739 28727 7ff7ed6ba40e 28726->28727 28727->28653 28728->28723 28729 7ff7ed6b9c89 28730 7ff7ed6b2aa0 101 API calls 28729->28730 28742 7ff7ed6b9d5c 28729->28742 28733 7ff7ed6b9ca1 28730->28733 28731 7ff7ed6b2bb0 101 API calls 28731->28739 28732 7ff7ed6b28d0 104 API calls 28732->28739 28734 7ff7ed6b28d0 104 API calls 28733->28734 28733->28742 28740 7ff7ed6b9cc9 28734->28740 28735 7ff7ed6b204c 100 API calls 28737 7ff7ed6ba3f5 28735->28737 28736 7ff7ed6b2aa0 101 API calls 28736->28739 28738 7ff7ed6a1fa0 31 API calls 28737->28738 28738->28722 28739->28729 28739->28731 28739->28732 28739->28736 28739->28742 28740->28742 28750 7ff7ed6b9cd7 __vcrt_InitializeCriticalSectionEx 28740->28750 28780 7ff7ed6c0bbc MultiByteToWideChar 28740->28780 28742->28735 28743 7ff7ed6ba1ec 28755 7ff7ed6ba2c2 28743->28755 28786 7ff7ed6dcf90 31 API calls 2 library calls 28743->28786 28745 7ff7ed6ba157 28745->28743 28783 7ff7ed6dcf90 31 API calls 2 library calls 28745->28783 28746 7ff7ed6ba249 28787 7ff7ed6db7bc 31 API calls _invalid_parameter_noinfo_noreturn 28746->28787 28749 7ff7ed6ba14b 28749->28653 28750->28742 28750->28743 28750->28745 28750->28749 28763 7ff7ed6ba429 28750->28763 28765 7ff7ed6c0f68 WideCharToMultiByte 28750->28765 28781 7ff7ed6baa88 45 API calls _snwprintf 28750->28781 28782 7ff7ed6da270 31 API calls 2 library calls 28750->28782 28751 7ff7ed6ba2ae 28751->28755 28788 7ff7ed6b8cd0 33 API calls 2 library calls 28751->28788 28752 7ff7ed6ba3a2 28754 7ff7ed6da450 31 API calls 28752->28754 28753 7ff7ed6ba16d 28784 7ff7ed6db7bc 31 API calls _invalid_parameter_noinfo_noreturn 28753->28784 28758 7ff7ed6ba3cb 28754->28758 28755->28752 28756 7ff7ed6b8e58 33 API calls 28755->28756 28756->28755 28759 7ff7ed6da450 31 API calls 28758->28759 28759->28742 28761 7ff7ed6ba1d8 28761->28743 28785 7ff7ed6b8cd0 33 API calls 2 library calls 28761->28785 28789 7ff7ed6d2624 8 API calls 28763->28789 28765->28750 28767->28711 28770 7ff7ed6ba468 28769->28770 28770->28655 28772 7ff7ed6da47d 28771->28772 28778 7ff7ed6da492 28772->28778 28790 7ff7ed6dd69c 15 API calls memcpy_s 28772->28790 28774 7ff7ed6da487 28791 7ff7ed6d78e4 31 API calls _invalid_parameter_noinfo_noreturn 28774->28791 28776 7ff7ed6d2320 _handle_error 8 API calls 28777 7ff7ed6b9b37 28776->28777 28777->28725 28778->28776 28779->28708 28780->28750 28781->28750 28782->28750 28783->28753 28784->28761 28785->28743 28786->28746 28787->28751 28788->28755 28789->28767 28790->28774 28791->28778 28792 7ff7ed6d0df5 14 API calls _com_raise_error 28337 7ff7ed6dd94c 28338 7ff7ed6dd95b abort 28337->28338 28339 7ff7ed6dd997 28337->28339 28338->28339 28341 7ff7ed6dd97e HeapAlloc 28338->28341 28343 7ff7ed6dbbc0 abort 2 API calls 28338->28343 28344 7ff7ed6dd69c 15 API calls memcpy_s 28339->28344 28341->28338 28342 7ff7ed6dd995 28341->28342 28343->28338 28344->28342 28370 7ff7ed6dbf2c 28377 7ff7ed6dbc34 28370->28377 28382 7ff7ed6dd440 35 API calls 2 library calls 28377->28382 28379 7ff7ed6dbc3f 28383 7ff7ed6dd068 35 API calls abort 28379->28383 28382->28379 28363 7ff7ed6d20f0 28364 7ff7ed6d2106 _com_error::_com_error 28363->28364 28365 7ff7ed6d4078 std::_Xinvalid_argument 2 API calls 28364->28365 28366 7ff7ed6d2117 28365->28366 28367 7ff7ed6d1900 _com_raise_error 14 API calls 28366->28367 28368 7ff7ed6d2163 28367->28368 28798 7ff7ed6d03e0 28799 7ff7ed6d041f 28798->28799 28800 7ff7ed6d0497 28798->28800 28802 7ff7ed6baae0 48 API calls 28799->28802 28801 7ff7ed6baae0 48 API calls 28800->28801 28803 7ff7ed6d04ab 28801->28803 28804 7ff7ed6d0433 28802->28804 28805 7ff7ed6bda98 48 API calls 28803->28805 28806 7ff7ed6bda98 48 API calls 28804->28806 28809 7ff7ed6d0442 memcpy_s 28805->28809 28806->28809 28807 7ff7ed6a1fa0 31 API calls 28808 7ff7ed6d0541 28807->28808 28811 7ff7ed6a250c SetDlgItemTextW 28808->28811 28809->28807 28810 7ff7ed6d05c6 28809->28810 28812 7ff7ed6d05cc 28809->28812 28813 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28810->28813 28815 7ff7ed6d0556 SetWindowTextW 28811->28815 28814 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28812->28814 28813->28812 28816 7ff7ed6d05d2 28814->28816 28817 7ff7ed6d056f 28815->28817 28818 7ff7ed6d059c 28815->28818 28817->28818 28820 7ff7ed6d05c1 28817->28820 28819 7ff7ed6d2320 _handle_error 8 API calls 28818->28819 28821 7ff7ed6d05af 28819->28821 28822 7ff7ed6d7904 _invalid_parameter_noinfo_noreturn 31 API calls 28820->28822 28822->28810 25851 7ff7ed6d11cf 25852 7ff7ed6d1102 25851->25852 25855 7ff7ed6d1900 25852->25855 25881 7ff7ed6d1558 25855->25881 25858 7ff7ed6d198b 25859 7ff7ed6d1868 DloadReleaseSectionWriteAccess 6 API calls 25858->25859 25860 7ff7ed6d1998 RaiseException 25859->25860 25861 7ff7ed6d1141 25860->25861 25862 7ff7ed6d19b4 25863 7ff7ed6d1a3d LoadLibraryExA 25862->25863 25864 7ff7ed6d1b85 25862->25864 25866 7ff7ed6d1aa9 25862->25866 25869 7ff7ed6d1abd 25862->25869 25865 7ff7ed6d1a54 GetLastError 25863->25865 25863->25866 25889 7ff7ed6d1868 25864->25889 25870 7ff7ed6d1a7e 25865->25870 25871 7ff7ed6d1a69 25865->25871 25867 7ff7ed6d1ab4 FreeLibrary 25866->25867 25866->25869 25867->25869 25868 7ff7ed6d1b1b GetProcAddress 25868->25864 25872 7ff7ed6d1b30 GetLastError 25868->25872 25869->25864 25869->25868 25874 7ff7ed6d1868 DloadReleaseSectionWriteAccess 6 API calls 25870->25874 25871->25866 25871->25870 25876 7ff7ed6d1b45 25872->25876 25875 7ff7ed6d1a8b RaiseException 25874->25875 25875->25861 25876->25864 25877 7ff7ed6d1868 DloadReleaseSectionWriteAccess 6 API calls 25876->25877 25878 7ff7ed6d1b67 RaiseException 25877->25878 25879 7ff7ed6d1558 _com_raise_error 6 API calls 25878->25879 25880 7ff7ed6d1b81 25879->25880 25880->25864 25882 7ff7ed6d15d3 25881->25882 25883 7ff7ed6d156e 25881->25883 25882->25858 25882->25862 25897 7ff7ed6d1604 25883->25897 25886 7ff7ed6d15ce 25888 7ff7ed6d1604 DloadReleaseSectionWriteAccess 3 API calls 25886->25888 25888->25882 25890 7ff7ed6d18d1 25889->25890 25891 7ff7ed6d1878 25889->25891 25890->25861 25892 7ff7ed6d1604 DloadReleaseSectionWriteAccess 3 API calls 25891->25892 25893 7ff7ed6d187d 25892->25893 25894 7ff7ed6d18cc 25893->25894 25895 7ff7ed6d17d8 DloadProtectSection 3 API calls 25893->25895 25896 7ff7ed6d1604 DloadReleaseSectionWriteAccess 3 API calls 25894->25896 25895->25894 25896->25890 25898 7ff7ed6d161f 25897->25898 25900 7ff7ed6d1573 25897->25900 25899 7ff7ed6d1624 GetModuleHandleW 25898->25899 25898->25900 25901 7ff7ed6d163e GetProcAddress 25899->25901 25902 7ff7ed6d1639 25899->25902 25900->25886 25904 7ff7ed6d17d8 25900->25904 25901->25902 25903 7ff7ed6d1653 GetProcAddress 25901->25903 25902->25900 25903->25902 25905 7ff7ed6d17fa DloadProtectSection 25904->25905 25906 7ff7ed6d183a VirtualProtect 25905->25906 25907 7ff7ed6d1802 25905->25907 25909 7ff7ed6d16a4 VirtualQuery GetSystemInfo 25905->25909 25906->25907 25907->25886 25909->25906
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                                                                    • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                                                    • API String ID: 255727823-2702805183
                                                                                                                    • Opcode ID: 37539dee0de0f8605dc8fdad2644b0fa5e272ae0c210a86a0140fc28e7c4c48a
                                                                                                                    • Instruction ID: 1fbf7a9a07d163b4291871f44faade179523296d8497987772b9b92fe0d11f37
                                                                                                                    • Opcode Fuzzy Hash: 37539dee0de0f8605dc8fdad2644b0fa5e272ae0c210a86a0140fc28e7c4c48a
                                                                                                                    • Instruction Fuzzy Hash: 21D29162E0C68281EA20FB25E8543B9A362EF897C4FD44133D94D476E6FE3DE554C722
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                                                                    • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                                                    • API String ID: 3007431893-3916287355
                                                                                                                    • Opcode ID: 813fa06c794cc39a0316894b44ee3bad2a4a143007a7910bb17a4a3915fa04b7
                                                                                                                    • Instruction ID: fb13a167b97683cef9ba637a0fd406a2110263ecd6b0c8b218b03044dc47f2bc
                                                                                                                    • Opcode Fuzzy Hash: 813fa06c794cc39a0316894b44ee3bad2a4a143007a7910bb17a4a3915fa04b7
                                                                                                                    • Instruction Fuzzy Hash: 38138E62F08A8299EB10EF64D8403EC67B2EB443D8F901537DA5D17AD9EF38E594C361

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1466 7ff7ed6d0754-7ff7ed6d0829 call 7ff7ed6bdfd0 call 7ff7ed6b62dc call 7ff7ed6c946c call 7ff7ed6d3cf0 call 7ff7ed6c9a14 1477 7ff7ed6d0860-7ff7ed6d0883 1466->1477 1478 7ff7ed6d082b-7ff7ed6d0840 1466->1478 1481 7ff7ed6d0885-7ff7ed6d089a 1477->1481 1482 7ff7ed6d08ba-7ff7ed6d08dd 1477->1482 1479 7ff7ed6d0842-7ff7ed6d0855 1478->1479 1480 7ff7ed6d085b call 7ff7ed6d220c 1478->1480 1479->1480 1483 7ff7ed6d0ddd-7ff7ed6d0de2 call 7ff7ed6d7904 1479->1483 1480->1477 1485 7ff7ed6d08b5 call 7ff7ed6d220c 1481->1485 1486 7ff7ed6d089c-7ff7ed6d08af 1481->1486 1487 7ff7ed6d0914-7ff7ed6d0937 1482->1487 1488 7ff7ed6d08df-7ff7ed6d08f4 1482->1488 1502 7ff7ed6d0de3-7ff7ed6d0df0 call 7ff7ed6d7904 1483->1502 1485->1482 1486->1483 1486->1485 1489 7ff7ed6d096e-7ff7ed6d097a GetCommandLineW 1487->1489 1490 7ff7ed6d0939-7ff7ed6d094e 1487->1490 1493 7ff7ed6d08f6-7ff7ed6d0909 1488->1493 1494 7ff7ed6d090f call 7ff7ed6d220c 1488->1494 1499 7ff7ed6d0980-7ff7ed6d09b7 call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6ccad0 1489->1499 1500 7ff7ed6d0b47-7ff7ed6d0b5e call 7ff7ed6b6454 1489->1500 1496 7ff7ed6d0950-7ff7ed6d0963 1490->1496 1497 7ff7ed6d0969 call 7ff7ed6d220c 1490->1497 1493->1483 1493->1494 1494->1487 1496->1483 1496->1497 1497->1489 1527 7ff7ed6d09ec-7ff7ed6d09f3 1499->1527 1528 7ff7ed6d09b9-7ff7ed6d09cc 1499->1528 1508 7ff7ed6d0b60-7ff7ed6d0b85 call 7ff7ed6a1fa0 call 7ff7ed6d3640 1500->1508 1509 7ff7ed6d0b89-7ff7ed6d0ce4 call 7ff7ed6a1fa0 SetEnvironmentVariableW GetLocalTime call 7ff7ed6b3e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff7ed6cb014 call 7ff7ed6b98ac call 7ff7ed6c67b4 * 2 DialogBoxParamW call 7ff7ed6c68a8 * 2 1500->1509 1514 7ff7ed6d0df5-7ff7ed6d0e2f call 7ff7ed6d1900 1502->1514 1508->1509 1572 7ff7ed6d0ce6 Sleep 1509->1572 1573 7ff7ed6d0cec-7ff7ed6d0cf3 1509->1573 1523 7ff7ed6d0e34-7ff7ed6d0e99 1514->1523 1523->1514 1529 7ff7ed6d0adb-7ff7ed6d0b12 call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6cfd0c 1527->1529 1530 7ff7ed6d09f9-7ff7ed6d0a13 OpenFileMappingW 1527->1530 1532 7ff7ed6d09ce-7ff7ed6d09e1 1528->1532 1533 7ff7ed6d09e7 call 7ff7ed6d220c 1528->1533 1529->1500 1556 7ff7ed6d0b14-7ff7ed6d0b27 1529->1556 1537 7ff7ed6d0ad0-7ff7ed6d0ad9 CloseHandle 1530->1537 1538 7ff7ed6d0a19-7ff7ed6d0a39 MapViewOfFile 1530->1538 1532->1502 1532->1533 1533->1527 1537->1500 1538->1537 1541 7ff7ed6d0a3f-7ff7ed6d0a6f UnmapViewOfFile MapViewOfFile 1538->1541 1541->1537 1544 7ff7ed6d0a71-7ff7ed6d0aca call 7ff7ed6ca190 call 7ff7ed6cfd0c call 7ff7ed6bb9b4 call 7ff7ed6bbb00 call 7ff7ed6bbb70 UnmapViewOfFile 1541->1544 1544->1537 1559 7ff7ed6d0b42 call 7ff7ed6d220c 1556->1559 1560 7ff7ed6d0b29-7ff7ed6d0b3c 1556->1560 1559->1500 1560->1559 1563 7ff7ed6d0dd7-7ff7ed6d0ddc call 7ff7ed6d7904 1560->1563 1563->1483 1572->1573 1576 7ff7ed6d0cf5 call 7ff7ed6c9f4c 1573->1576 1577 7ff7ed6d0cfa-7ff7ed6d0d1d call 7ff7ed6bb8e0 DeleteObject 1573->1577 1576->1577 1581 7ff7ed6d0d25-7ff7ed6d0d2c 1577->1581 1582 7ff7ed6d0d1f DeleteObject 1577->1582 1583 7ff7ed6d0d2e-7ff7ed6d0d35 1581->1583 1584 7ff7ed6d0d48-7ff7ed6d0d59 1581->1584 1582->1581 1583->1584 1585 7ff7ed6d0d37-7ff7ed6d0d43 call 7ff7ed6aba0c 1583->1585 1586 7ff7ed6d0d5b-7ff7ed6d0d67 call 7ff7ed6cfe24 CloseHandle 1584->1586 1587 7ff7ed6d0d6d-7ff7ed6d0d7a 1584->1587 1585->1584 1586->1587 1590 7ff7ed6d0d9f-7ff7ed6d0da4 call 7ff7ed6c94e4 1587->1590 1591 7ff7ed6d0d7c-7ff7ed6d0d89 1587->1591 1598 7ff7ed6d0da9-7ff7ed6d0dd6 call 7ff7ed6d2320 1590->1598 1593 7ff7ed6d0d8b-7ff7ed6d0d93 1591->1593 1594 7ff7ed6d0d99-7ff7ed6d0d9b 1591->1594 1593->1590 1596 7ff7ed6d0d95-7ff7ed6d0d97 1593->1596 1594->1590 1597 7ff7ed6d0d9d 1594->1597 1596->1590 1597->1590
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                                                    • API String ID: 1048086575-3710569615
                                                                                                                    • Opcode ID: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                                                                                                                    • Instruction ID: 9eb25eaa1c54d15d03cf73c81508fdd66ffc8bbdf6941d4ed574175da0d08c36
                                                                                                                    • Opcode Fuzzy Hash: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                                                                                                                    • Instruction Fuzzy Hash: 16127321E1CB8285EB10BB25E8553B9A362FF887C4F804633D95D47AA5FF3CE1548762

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                                                    • String ID: $%s:$CAPTION
                                                                                                                    • API String ID: 2100155373-404845831
                                                                                                                    • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                                                    • Instruction ID: e5277c4e61114886020a4f581694e0d850e8a2c4d037cd8926021f66f1728d3d
                                                                                                                    • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                                                    • Instruction Fuzzy Hash: 8391C732B1C64186E718EF29A80476DA7A1FB887C4F945536EE4D47B98EF3CE905CB10

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                                                    • String ID: PNG
                                                                                                                    • API String ID: 211097158-364855578
                                                                                                                    • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                                                    • Instruction ID: ec35344c2617e3b238bb2c928201c537f620ca5a49968f5fa37a3870cc6095d7
                                                                                                                    • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                                                    • Instruction Fuzzy Hash: BE412125F1DB0281EE14AB16D854379E3A2AF88BD4F844436CE0D4B3A4FF7DE5489762
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: __tmp_reference_source_
                                                                                                                    • API String ID: 3668304517-685763994
                                                                                                                    • Opcode ID: 9bcb2e275ed03a8d7aba150d2a16dff366c135dca2d4fe69d6366dd8b3466e57
                                                                                                                    • Instruction ID: 96c973a237508ddc9093c827c3029b5b724d8f22392a0ca6db3ca532f49b9613
                                                                                                                    • Opcode Fuzzy Hash: 9bcb2e275ed03a8d7aba150d2a16dff366c135dca2d4fe69d6366dd8b3466e57
                                                                                                                    • Instruction Fuzzy Hash: 5CE27362E0C6C292EA64EB25D1503AEE762FB857C4F804133DB9D076A5EF3CE455C722
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: CMT
                                                                                                                    • API String ID: 3668304517-2756464174
                                                                                                                    • Opcode ID: e7d2881bcea704baf087d5cf8019b1fde48ecf371bf3b89e3d4cde4d9678f091
                                                                                                                    • Instruction ID: 1480ea3995f2509eb1aa6684c5cddd05d893194bd24ffb6a2fe8c6e83ab98f06
                                                                                                                    • Opcode Fuzzy Hash: e7d2881bcea704baf087d5cf8019b1fde48ecf371bf3b89e3d4cde4d9678f091
                                                                                                                    • Instruction Fuzzy Hash: 1DE2C022F0C68286EB14EB65D5503FDA7A2FB453C8F840436DA9E47696EF3CE455C322

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 3712 7ff7ed6b40bc-7ff7ed6b40f3 3713 7ff7ed6b41d2-7ff7ed6b41df FindNextFileW 3712->3713 3714 7ff7ed6b40f9-7ff7ed6b4101 3712->3714 3717 7ff7ed6b41e1-7ff7ed6b41f1 GetLastError 3713->3717 3718 7ff7ed6b41f3-7ff7ed6b41f6 3713->3718 3715 7ff7ed6b4106-7ff7ed6b4118 FindFirstFileW 3714->3715 3716 7ff7ed6b4103 3714->3716 3715->3718 3719 7ff7ed6b411e-7ff7ed6b4146 call 7ff7ed6b6a0c 3715->3719 3716->3715 3720 7ff7ed6b41ca-7ff7ed6b41cd 3717->3720 3721 7ff7ed6b4211-7ff7ed6b4253 call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6b8090 3718->3721 3722 7ff7ed6b41f8-7ff7ed6b4200 3718->3722 3732 7ff7ed6b4167-7ff7ed6b4170 3719->3732 3733 7ff7ed6b4148-7ff7ed6b4164 FindFirstFileW 3719->3733 3724 7ff7ed6b42eb-7ff7ed6b430e call 7ff7ed6d2320 3720->3724 3748 7ff7ed6b4255-7ff7ed6b426c 3721->3748 3749 7ff7ed6b428c-7ff7ed6b42e6 call 7ff7ed6bf168 * 3 3721->3749 3726 7ff7ed6b4202 3722->3726 3727 7ff7ed6b4205-7ff7ed6b420c call 7ff7ed6a20b0 3722->3727 3726->3727 3727->3721 3736 7ff7ed6b4172-7ff7ed6b4189 3732->3736 3737 7ff7ed6b41a9-7ff7ed6b41ad 3732->3737 3733->3732 3739 7ff7ed6b41a4 call 7ff7ed6d220c 3736->3739 3740 7ff7ed6b418b-7ff7ed6b419e 3736->3740 3737->3718 3741 7ff7ed6b41af-7ff7ed6b41be GetLastError 3737->3741 3739->3737 3740->3739 3743 7ff7ed6b4315-7ff7ed6b431b call 7ff7ed6d7904 3740->3743 3745 7ff7ed6b41c0-7ff7ed6b41c6 3741->3745 3746 7ff7ed6b41c8 3741->3746 3745->3720 3745->3746 3746->3720 3751 7ff7ed6b4287 call 7ff7ed6d220c 3748->3751 3752 7ff7ed6b426e-7ff7ed6b4281 3748->3752 3749->3724 3751->3749 3752->3751 3755 7ff7ed6b430f-7ff7ed6b4314 call 7ff7ed6d7904 3752->3755 3755->3743
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 474548282-0
                                                                                                                    • Opcode ID: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                                                                                    • Instruction ID: 31beb2fc504533488b83cdebf95a66fedc3f0dc383711f377ff5eb7cc07b040e
                                                                                                                    • Opcode Fuzzy Hash: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                                                                                    • Instruction Fuzzy Hash: C161B462E0C64285DA10EF29E440379A362FF957E8F905332EAAD076D9EF3CE544C711

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 3823 7ff7ed6a5e24-7ff7ed6a6129 call 7ff7ed6b833c call 7ff7ed6b85f0 3829 7ff7ed6a612e-7ff7ed6a6132 3823->3829 3830 7ff7ed6a6141-7ff7ed6a6171 call 7ff7ed6b83d8 call 7ff7ed6b8570 call 7ff7ed6b8528 3829->3830 3831 7ff7ed6a6134-7ff7ed6a613c call 7ff7ed6a6fcc 3829->3831 3849 7ff7ed6a6973-7ff7ed6a6976 call 7ff7ed6a466c 3830->3849 3850 7ff7ed6a6177-7ff7ed6a6179 3830->3850 3837 7ff7ed6a697b 3831->3837 3838 7ff7ed6a697e-7ff7ed6a6985 3837->3838 3840 7ff7ed6a69b4-7ff7ed6a69e3 call 7ff7ed6d2320 3838->3840 3841 7ff7ed6a6987-7ff7ed6a6998 3838->3841 3843 7ff7ed6a69af call 7ff7ed6d220c 3841->3843 3844 7ff7ed6a699a-7ff7ed6a69ad 3841->3844 3843->3840 3844->3843 3847 7ff7ed6a69e4-7ff7ed6a69e9 call 7ff7ed6d7904 3844->3847 3858 7ff7ed6a69ea-7ff7ed6a69ef call 7ff7ed6d7904 3847->3858 3849->3837 3850->3849 3852 7ff7ed6a617f-7ff7ed6a6189 3850->3852 3852->3849 3855 7ff7ed6a618f-7ff7ed6a6192 3852->3855 3855->3849 3857 7ff7ed6a6198-7ff7ed6a61aa call 7ff7ed6b85f0 3855->3857 3857->3831 3863 7ff7ed6a61ac-7ff7ed6a61fd call 7ff7ed6b84f8 call 7ff7ed6b8528 * 2 3857->3863 3864 7ff7ed6a69f0-7ff7ed6a69f7 call 7ff7ed6d7904 3858->3864 3873 7ff7ed6a623f-7ff7ed6a6249 3863->3873 3874 7ff7ed6a61ff-7ff7ed6a6222 call 7ff7ed6a466c call 7ff7ed6aba0c 3863->3874 3876 7ff7ed6a6266-7ff7ed6a6270 3873->3876 3877 7ff7ed6a624b-7ff7ed6a6260 call 7ff7ed6b8528 3873->3877 3874->3873 3891 7ff7ed6a6224-7ff7ed6a622e call 7ff7ed6a433c 3874->3891 3880 7ff7ed6a6272-7ff7ed6a627b call 7ff7ed6b8528 3876->3880 3881 7ff7ed6a627e-7ff7ed6a6296 call 7ff7ed6a334c 3876->3881 3877->3849 3877->3876 3880->3881 3889 7ff7ed6a62b3 3881->3889 3890 7ff7ed6a6298-7ff7ed6a629b 3881->3890 3893 7ff7ed6a62b6-7ff7ed6a62c8 3889->3893 3890->3889 3892 7ff7ed6a629d-7ff7ed6a62b1 3890->3892 3891->3873 3892->3889 3892->3893 3895 7ff7ed6a68b7-7ff7ed6a6929 call 7ff7ed6b4d04 call 7ff7ed6b8528 3893->3895 3896 7ff7ed6a62ce-7ff7ed6a62d1 3893->3896 3912 7ff7ed6a6936 3895->3912 3913 7ff7ed6a692b-7ff7ed6a6934 call 7ff7ed6b8528 3895->3913 3897 7ff7ed6a6481-7ff7ed6a64f4 call 7ff7ed6b4c74 call 7ff7ed6b8528 * 2 3896->3897 3898 7ff7ed6a62d7-7ff7ed6a62da 3896->3898 3929 7ff7ed6a64f6-7ff7ed6a6500 3897->3929 3930 7ff7ed6a6507-7ff7ed6a6533 call 7ff7ed6b8528 3897->3930 3898->3897 3900 7ff7ed6a62e0-7ff7ed6a62e3 3898->3900 3904 7ff7ed6a62e5-7ff7ed6a62e8 3900->3904 3905 7ff7ed6a632e-7ff7ed6a6353 call 7ff7ed6b8528 3900->3905 3909 7ff7ed6a62ee-7ff7ed6a6329 call 7ff7ed6b8528 3904->3909 3910 7ff7ed6a696d-7ff7ed6a6971 3904->3910 3919 7ff7ed6a6355-7ff7ed6a638f call 7ff7ed6a4228 call 7ff7ed6a3c84 call 7ff7ed6a701c call 7ff7ed6a1fa0 3905->3919 3920 7ff7ed6a639e-7ff7ed6a63c5 call 7ff7ed6b8528 call 7ff7ed6b8384 3905->3920 3909->3910 3910->3838 3921 7ff7ed6a6939-7ff7ed6a6946 3912->3921 3913->3921 3970 7ff7ed6a6390-7ff7ed6a6399 call 7ff7ed6a1fa0 3919->3970 3942 7ff7ed6a6402-7ff7ed6a641f call 7ff7ed6b8444 3920->3942 3943 7ff7ed6a63c7-7ff7ed6a6400 call 7ff7ed6a4228 call 7ff7ed6a3c84 call 7ff7ed6a701c call 7ff7ed6a1fa0 3920->3943 3927 7ff7ed6a6948-7ff7ed6a694a 3921->3927 3928 7ff7ed6a694c 3921->3928 3927->3928 3933 7ff7ed6a694f-7ff7ed6a6959 3927->3933 3928->3933 3929->3930 3944 7ff7ed6a6535-7ff7ed6a6544 call 7ff7ed6b83d8 call 7ff7ed6bf134 3930->3944 3945 7ff7ed6a6549-7ff7ed6a6557 3930->3945 3933->3910 3937 7ff7ed6a695b-7ff7ed6a6968 call 7ff7ed6a4840 3933->3937 3937->3910 3960 7ff7ed6a6421-7ff7ed6a646f call 7ff7ed6b8444 * 2 call 7ff7ed6bc800 call 7ff7ed6d4a70 3942->3960 3961 7ff7ed6a6475-7ff7ed6a647c 3942->3961 3943->3970 3944->3945 3950 7ff7ed6a6572-7ff7ed6a6595 call 7ff7ed6b8528 3945->3950 3951 7ff7ed6a6559-7ff7ed6a656c call 7ff7ed6b83d8 3945->3951 3966 7ff7ed6a65a0-7ff7ed6a65b0 3950->3966 3967 7ff7ed6a6597-7ff7ed6a659e 3950->3967 3951->3950 3960->3961 3961->3910 3971 7ff7ed6a65b3-7ff7ed6a65eb call 7ff7ed6b8528 * 2 3966->3971 3967->3971 3970->3920 3987 7ff7ed6a65f6-7ff7ed6a65fa 3971->3987 3988 7ff7ed6a65ed-7ff7ed6a65f4 3971->3988 3990 7ff7ed6a6603-7ff7ed6a6632 3987->3990 3992 7ff7ed6a65fc 3987->3992 3988->3990 3993 7ff7ed6a663f 3990->3993 3994 7ff7ed6a6634-7ff7ed6a6638 3990->3994 3992->3990 3996 7ff7ed6a6641-7ff7ed6a6656 3993->3996 3994->3993 3995 7ff7ed6a663a-7ff7ed6a663d 3994->3995 3995->3996 3997 7ff7ed6a6658-7ff7ed6a665b 3996->3997 3998 7ff7ed6a66ca 3996->3998 3997->3998 3999 7ff7ed6a665d-7ff7ed6a6683 3997->3999 4000 7ff7ed6a66d2-7ff7ed6a6731 call 7ff7ed6a3d00 call 7ff7ed6b8444 call 7ff7ed6c0d54 3998->4000 3999->4000 4001 7ff7ed6a6685-7ff7ed6a66a9 3999->4001 4011 7ff7ed6a6733-7ff7ed6a6740 call 7ff7ed6a4840 4000->4011 4012 7ff7ed6a6745-7ff7ed6a6749 4000->4012 4003 7ff7ed6a66b2-7ff7ed6a66bf 4001->4003 4004 7ff7ed6a66ab 4001->4004 4003->4000 4006 7ff7ed6a66c1-7ff7ed6a66c8 4003->4006 4004->4003 4006->4000 4011->4012 4013 7ff7ed6a675b-7ff7ed6a6772 call 7ff7ed6d797c 4012->4013 4014 7ff7ed6a674b-7ff7ed6a6756 call 7ff7ed6a473c 4012->4014 4021 7ff7ed6a6774 4013->4021 4022 7ff7ed6a6777-7ff7ed6a677e 4013->4022 4020 7ff7ed6a6859-7ff7ed6a6860 4014->4020 4023 7ff7ed6a6862-7ff7ed6a6872 call 7ff7ed6a433c 4020->4023 4024 7ff7ed6a6873-7ff7ed6a687b 4020->4024 4021->4022 4025 7ff7ed6a6780-7ff7ed6a6783 4022->4025 4026 7ff7ed6a67a3-7ff7ed6a67ba call 7ff7ed6d797c 4022->4026 4023->4024 4024->3910 4028 7ff7ed6a6881-7ff7ed6a6892 4024->4028 4029 7ff7ed6a6785 4025->4029 4030 7ff7ed6a679c 4025->4030 4037 7ff7ed6a67bf-7ff7ed6a67c6 4026->4037 4038 7ff7ed6a67bc 4026->4038 4034 7ff7ed6a6894-7ff7ed6a68a7 4028->4034 4035 7ff7ed6a68ad-7ff7ed6a68b2 call 7ff7ed6d220c 4028->4035 4036 7ff7ed6a6788-7ff7ed6a6791 4029->4036 4030->4026 4034->3864 4034->4035 4035->3910 4036->4026 4040 7ff7ed6a6793-7ff7ed6a679a 4036->4040 4037->4020 4041 7ff7ed6a67cc-7ff7ed6a67cf 4037->4041 4038->4037 4040->4030 4040->4036 4043 7ff7ed6a67d1 4041->4043 4044 7ff7ed6a67e8-7ff7ed6a67f0 4041->4044 4045 7ff7ed6a67d4-7ff7ed6a67dd 4043->4045 4044->4020 4046 7ff7ed6a67f2-7ff7ed6a6826 call 7ff7ed6b8360 call 7ff7ed6b8598 call 7ff7ed6b8528 4044->4046 4045->4020 4047 7ff7ed6a67df-7ff7ed6a67e6 4045->4047 4046->4020 4054 7ff7ed6a6828-7ff7ed6a6839 4046->4054 4047->4044 4047->4045 4055 7ff7ed6a6854 call 7ff7ed6d220c 4054->4055 4056 7ff7ed6a683b-7ff7ed6a684e 4054->4056 4055->4020 4056->3858 4056->4055
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: CMT
                                                                                                                    • API String ID: 0-2756464174
                                                                                                                    • Opcode ID: 359dff1c80db5b7743fdae80869b9e224ec7716eef54e7df647838bf343512b4
                                                                                                                    • Instruction ID: 6c9f54b9c94fa61ba719f7831eac4edd19a5d8429cbdf6eeaed4404e8db501d4
                                                                                                                    • Opcode Fuzzy Hash: 359dff1c80db5b7743fdae80869b9e224ec7716eef54e7df647838bf343512b4
                                                                                                                    • Instruction Fuzzy Hash: 5C42B522F0CA8256EB18EBB4D1503FDA7A2EB51784F800137DB9E57696EF38E515C312
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7db5a9875e5f6d1f603b63d16782f803fa3cf1fd728954a44ec6c9bafca29fc1
                                                                                                                    • Instruction ID: d6f06f3c458bdf98c8e39a175b450d08cf5d48467cae0aa2595b2fab67b2af08
                                                                                                                    • Opcode Fuzzy Hash: 7db5a9875e5f6d1f603b63d16782f803fa3cf1fd728954a44ec6c9bafca29fc1
                                                                                                                    • Instruction Fuzzy Hash: 72E1D322E0D2828AEB64EF29A0443BDB792FB547C8F854136DB4E47785EE3CF5418716
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 53555d60e433f5a3dc88a335546444deb1b2c319cd0ac3813d1caa597a53afb2
                                                                                                                    • Instruction ID: 1e56175946e75600b6edebb4dcddebaeabbfd0550a01950943c8dbc4b7a4af83
                                                                                                                    • Opcode Fuzzy Hash: 53555d60e433f5a3dc88a335546444deb1b2c319cd0ac3813d1caa597a53afb2
                                                                                                                    • Instruction Fuzzy Hash: 4CB1BFA2B09BC992DE58EB66D5087E9A392BB45BC4F848037DE0D0B751EF3CE155C312
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3340455307-0
                                                                                                                    • Opcode ID: 2cb8b9ec6f6f726b57ae810d2a963647076a0ed4099b9c3b4f35ab7767efdb68
                                                                                                                    • Instruction ID: c9e60c196b9761a7b7bff42d78520d1bd0f3fd3603603bb3e2148cee6664f180
                                                                                                                    • Opcode Fuzzy Hash: 2cb8b9ec6f6f726b57ae810d2a963647076a0ed4099b9c3b4f35ab7767efdb68
                                                                                                                    • Instruction Fuzzy Hash: 9F410822F19A524AFA64FF15A94076AA253FBC47C8F844032DE0D07799EE3CF4468715

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 7ff7ed6bdfd0-7ff7ed6be024 call 7ff7ed6d2450 GetModuleHandleW 3 7ff7ed6be026-7ff7ed6be039 GetProcAddress 0->3 4 7ff7ed6be07b-7ff7ed6be3a5 0->4 7 7ff7ed6be053-7ff7ed6be066 GetProcAddress 3->7 8 7ff7ed6be03b-7ff7ed6be04a 3->8 5 7ff7ed6be503-7ff7ed6be521 call 7ff7ed6b6454 call 7ff7ed6b7df4 4->5 6 7ff7ed6be3ab-7ff7ed6be3b4 call 7ff7ed6db788 4->6 19 7ff7ed6be525-7ff7ed6be52f call 7ff7ed6b51a4 5->19 6->5 15 7ff7ed6be3ba-7ff7ed6be3fd call 7ff7ed6b6454 CreateFileW 6->15 7->4 11 7ff7ed6be068-7ff7ed6be078 7->11 8->7 11->4 22 7ff7ed6be4f0-7ff7ed6be4fe CloseHandle call 7ff7ed6a1fa0 15->22 23 7ff7ed6be403-7ff7ed6be416 SetFilePointer 15->23 27 7ff7ed6be531-7ff7ed6be53c call 7ff7ed6bdd88 19->27 28 7ff7ed6be564-7ff7ed6be5ac call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6b8090 call 7ff7ed6a1fa0 call 7ff7ed6b32bc 19->28 22->5 23->22 25 7ff7ed6be41c-7ff7ed6be43e ReadFile 23->25 25->22 29 7ff7ed6be444-7ff7ed6be452 25->29 27->28 39 7ff7ed6be53e-7ff7ed6be562 CompareStringW 27->39 66 7ff7ed6be5b1-7ff7ed6be5b4 28->66 32 7ff7ed6be800-7ff7ed6be807 call 7ff7ed6d2624 29->32 33 7ff7ed6be458-7ff7ed6be4ac call 7ff7ed6d797c call 7ff7ed6a129c 29->33 48 7ff7ed6be4c3-7ff7ed6be4d9 call 7ff7ed6bd0a0 33->48 39->28 42 7ff7ed6be5bd-7ff7ed6be5c6 39->42 42->19 46 7ff7ed6be5cc 42->46 49 7ff7ed6be5d1-7ff7ed6be5d4 46->49 61 7ff7ed6be4ae-7ff7ed6be4be call 7ff7ed6bdd88 48->61 62 7ff7ed6be4db-7ff7ed6be4eb call 7ff7ed6a1fa0 * 2 48->62 52 7ff7ed6be63f-7ff7ed6be642 49->52 53 7ff7ed6be5d6-7ff7ed6be5d9 49->53 57 7ff7ed6be7c2-7ff7ed6be7ff call 7ff7ed6a1fa0 * 2 call 7ff7ed6d2320 52->57 58 7ff7ed6be648-7ff7ed6be65b call 7ff7ed6b7eb0 call 7ff7ed6b51a4 52->58 59 7ff7ed6be5dd-7ff7ed6be62d call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6b8090 call 7ff7ed6a1fa0 call 7ff7ed6b32bc 53->59 82 7ff7ed6be661-7ff7ed6be701 call 7ff7ed6bdd88 * 2 call 7ff7ed6baae0 call 7ff7ed6bda98 call 7ff7ed6baae0 call 7ff7ed6bdc2c call 7ff7ed6c87ac call 7ff7ed6a19e0 58->82 83 7ff7ed6be706-7ff7ed6be753 call 7ff7ed6bda98 AllocConsole 58->83 107 7ff7ed6be62f-7ff7ed6be638 59->107 108 7ff7ed6be63c 59->108 61->48 62->22 72 7ff7ed6be5b6 66->72 73 7ff7ed6be5ce 66->73 72->42 73->49 100 7ff7ed6be7b4-7ff7ed6be7bb call 7ff7ed6a19e0 ExitProcess 82->100 94 7ff7ed6be7b0 83->94 95 7ff7ed6be755-7ff7ed6be7aa GetCurrentProcessId AttachConsole call 7ff7ed6be868 call 7ff7ed6be858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->95 94->100 95->94 107->59 112 7ff7ed6be63a 107->112 108->52 112->52
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                                                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                                                    • API String ID: 1496594111-2013832382
                                                                                                                    • Opcode ID: 652c747d7e630e86415ee3ad066f254a367a94a472fe2acd263d178260856de2
                                                                                                                    • Instruction ID: 0f11d5860616e8b06ff2e93d6f164c05ea15ca0f3898405829cf5f0eb43f0f93
                                                                                                                    • Opcode Fuzzy Hash: 652c747d7e630e86415ee3ad066f254a367a94a472fe2acd263d178260856de2
                                                                                                                    • Instruction Fuzzy Hash: 2532E731E0DB8299EB11AB60E8402E9B3A6FF48394F900237DA8D477A5FF39D255C751
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6B8E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7ED6B8F8D
                                                                                                                    • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7ED6B9F75
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6BA42F
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6BA435
                                                                                                                      • Part of subcall function 00007FF7ED6C0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7ED6C0B44), ref: 00007FF7ED6C0BE9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                                                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                                                    • API String ID: 3629253777-3268106645
                                                                                                                    • Opcode ID: fbb6bb3726090cda1910aaae614b465107cbfe89c1b50f7df837cda548b3fcd6
                                                                                                                    • Instruction ID: ecbd0fa666c52fd5f520d89bc54eb2dc39cb352e27e7c3fd12538dd210852e8d
                                                                                                                    • Opcode Fuzzy Hash: fbb6bb3726090cda1910aaae614b465107cbfe89c1b50f7df837cda548b3fcd6
                                                                                                                    • Instruction Fuzzy Hash: 31629922E1DA8285EB20EB24D4483BDA362FB547C8FC05133DA4E47695FF79E945C362

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1911 7ff7ed6d1900-7ff7ed6d1989 call 7ff7ed6d1558 1914 7ff7ed6d19b4-7ff7ed6d19d1 1911->1914 1915 7ff7ed6d198b-7ff7ed6d19af call 7ff7ed6d1868 RaiseException 1911->1915 1917 7ff7ed6d19d3-7ff7ed6d19e4 1914->1917 1918 7ff7ed6d19e6-7ff7ed6d19ea 1914->1918 1923 7ff7ed6d1bb8-7ff7ed6d1bd5 1915->1923 1920 7ff7ed6d19ed-7ff7ed6d19f9 1917->1920 1918->1920 1921 7ff7ed6d19fb-7ff7ed6d1a0d 1920->1921 1922 7ff7ed6d1a1a-7ff7ed6d1a1d 1920->1922 1931 7ff7ed6d1a13 1921->1931 1932 7ff7ed6d1b89-7ff7ed6d1b93 1921->1932 1924 7ff7ed6d1a23-7ff7ed6d1a26 1922->1924 1925 7ff7ed6d1ac4-7ff7ed6d1acb 1922->1925 1929 7ff7ed6d1a3d-7ff7ed6d1a52 LoadLibraryExA 1924->1929 1930 7ff7ed6d1a28-7ff7ed6d1a3b 1924->1930 1927 7ff7ed6d1adf-7ff7ed6d1ae2 1925->1927 1928 7ff7ed6d1acd-7ff7ed6d1adc 1925->1928 1933 7ff7ed6d1b85 1927->1933 1934 7ff7ed6d1ae8-7ff7ed6d1aec 1927->1934 1928->1927 1935 7ff7ed6d1a54-7ff7ed6d1a67 GetLastError 1929->1935 1936 7ff7ed6d1aa9-7ff7ed6d1ab2 1929->1936 1930->1929 1930->1936 1931->1922 1943 7ff7ed6d1b95-7ff7ed6d1ba6 1932->1943 1944 7ff7ed6d1bb0 call 7ff7ed6d1868 1932->1944 1933->1932 1941 7ff7ed6d1b1b-7ff7ed6d1b2e GetProcAddress 1934->1941 1942 7ff7ed6d1aee-7ff7ed6d1af2 1934->1942 1945 7ff7ed6d1a7e-7ff7ed6d1aa4 call 7ff7ed6d1868 RaiseException 1935->1945 1946 7ff7ed6d1a69-7ff7ed6d1a7c 1935->1946 1937 7ff7ed6d1ab4-7ff7ed6d1ab7 FreeLibrary 1936->1937 1938 7ff7ed6d1abd 1936->1938 1937->1938 1938->1925 1941->1933 1947 7ff7ed6d1b30-7ff7ed6d1b43 GetLastError 1941->1947 1942->1941 1948 7ff7ed6d1af4-7ff7ed6d1aff 1942->1948 1943->1944 1956 7ff7ed6d1bb5 1944->1956 1945->1923 1946->1936 1946->1945 1952 7ff7ed6d1b45-7ff7ed6d1b58 1947->1952 1953 7ff7ed6d1b5a-7ff7ed6d1b81 call 7ff7ed6d1868 RaiseException call 7ff7ed6d1558 1947->1953 1948->1941 1954 7ff7ed6d1b01-7ff7ed6d1b08 1948->1954 1952->1933 1952->1953 1953->1933 1954->1941 1958 7ff7ed6d1b0a-7ff7ed6d1b0f 1954->1958 1956->1923 1958->1941 1961 7ff7ed6d1b11-7ff7ed6d1b19 1958->1961 1961->1933 1961->1941
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                                                    • String ID: H
                                                                                                                    • API String ID: 3432403771-2852464175
                                                                                                                    • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                                                    • Instruction ID: 27a36b8aca31f6652ae203982c53a0a66afaf0aa395b8daadcc0e433622f97e7
                                                                                                                    • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                                                    • Instruction Fuzzy Hash: D7915C32F09B128AEB40EF65E8507A8A3B2BB08B94B844436DE0D17794FF7CE555C361

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1989 7ff7ed6cf4e0-7ff7ed6cf523 1990 7ff7ed6cf894-7ff7ed6cf8b9 call 7ff7ed6a1fa0 call 7ff7ed6d2320 1989->1990 1991 7ff7ed6cf529-7ff7ed6cf565 call 7ff7ed6d3cf0 1989->1991 1997 7ff7ed6cf567 1991->1997 1998 7ff7ed6cf56a-7ff7ed6cf571 1991->1998 1997->1998 2000 7ff7ed6cf573-7ff7ed6cf577 1998->2000 2001 7ff7ed6cf582-7ff7ed6cf586 1998->2001 2004 7ff7ed6cf57c-7ff7ed6cf580 2000->2004 2005 7ff7ed6cf579 2000->2005 2002 7ff7ed6cf58b-7ff7ed6cf596 2001->2002 2003 7ff7ed6cf588 2001->2003 2006 7ff7ed6cf59c 2002->2006 2007 7ff7ed6cf628 2002->2007 2003->2002 2004->2002 2005->2004 2008 7ff7ed6cf5a2-7ff7ed6cf5a9 2006->2008 2009 7ff7ed6cf62c-7ff7ed6cf62f 2007->2009 2010 7ff7ed6cf5ab 2008->2010 2011 7ff7ed6cf5ae-7ff7ed6cf5b3 2008->2011 2012 7ff7ed6cf631-7ff7ed6cf635 2009->2012 2013 7ff7ed6cf637-7ff7ed6cf63a 2009->2013 2010->2011 2014 7ff7ed6cf5e5-7ff7ed6cf5f0 2011->2014 2015 7ff7ed6cf5b5 2011->2015 2012->2013 2016 7ff7ed6cf660-7ff7ed6cf673 call 7ff7ed6b63ac 2012->2016 2013->2016 2017 7ff7ed6cf63c-7ff7ed6cf643 2013->2017 2018 7ff7ed6cf5f5-7ff7ed6cf5fa 2014->2018 2019 7ff7ed6cf5f2 2014->2019 2020 7ff7ed6cf5ca-7ff7ed6cf5d0 2015->2020 2034 7ff7ed6cf675-7ff7ed6cf693 call 7ff7ed6c13c4 2016->2034 2035 7ff7ed6cf698-7ff7ed6cf6ed call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6b32a8 call 7ff7ed6a1fa0 2016->2035 2017->2016 2021 7ff7ed6cf645-7ff7ed6cf65c 2017->2021 2023 7ff7ed6cf600-7ff7ed6cf607 2018->2023 2024 7ff7ed6cf8ba-7ff7ed6cf8c1 2018->2024 2019->2018 2025 7ff7ed6cf5d2 2020->2025 2026 7ff7ed6cf5b7-7ff7ed6cf5be 2020->2026 2021->2016 2028 7ff7ed6cf60c-7ff7ed6cf612 2023->2028 2029 7ff7ed6cf609 2023->2029 2032 7ff7ed6cf8c3 2024->2032 2033 7ff7ed6cf8c6-7ff7ed6cf8cb 2024->2033 2025->2014 2030 7ff7ed6cf5c3-7ff7ed6cf5c8 2026->2030 2031 7ff7ed6cf5c0 2026->2031 2028->2024 2038 7ff7ed6cf618-7ff7ed6cf622 2028->2038 2029->2028 2030->2020 2039 7ff7ed6cf5d4-7ff7ed6cf5db 2030->2039 2031->2030 2032->2033 2040 7ff7ed6cf8cd-7ff7ed6cf8d4 2033->2040 2041 7ff7ed6cf8de-7ff7ed6cf8e6 2033->2041 2034->2035 2056 7ff7ed6cf6ef-7ff7ed6cf73d call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6b5b60 call 7ff7ed6a1fa0 2035->2056 2057 7ff7ed6cf742-7ff7ed6cf74f ShellExecuteExW 2035->2057 2038->2007 2038->2008 2046 7ff7ed6cf5e0 2039->2046 2047 7ff7ed6cf5dd 2039->2047 2048 7ff7ed6cf8d6 2040->2048 2049 7ff7ed6cf8d9 2040->2049 2043 7ff7ed6cf8eb-7ff7ed6cf8f6 2041->2043 2044 7ff7ed6cf8e8 2041->2044 2043->2009 2044->2043 2046->2014 2047->2046 2048->2049 2049->2041 2056->2057 2058 7ff7ed6cf755-7ff7ed6cf75f 2057->2058 2059 7ff7ed6cf846-7ff7ed6cf84e 2057->2059 2063 7ff7ed6cf76f-7ff7ed6cf772 2058->2063 2064 7ff7ed6cf761-7ff7ed6cf764 2058->2064 2061 7ff7ed6cf850-7ff7ed6cf866 2059->2061 2062 7ff7ed6cf882-7ff7ed6cf88f 2059->2062 2066 7ff7ed6cf87d call 7ff7ed6d220c 2061->2066 2067 7ff7ed6cf868-7ff7ed6cf87b 2061->2067 2062->1990 2069 7ff7ed6cf774-7ff7ed6cf77f call 7ff7ed70e188 2063->2069 2070 7ff7ed6cf78e-7ff7ed6cf7ad call 7ff7ed70e1b8 call 7ff7ed6cfe24 2063->2070 2064->2063 2068 7ff7ed6cf766-7ff7ed6cf76d 2064->2068 2066->2062 2067->2066 2072 7ff7ed6cf8fb-7ff7ed6cf903 call 7ff7ed6d7904 2067->2072 2068->2063 2074 7ff7ed6cf7e3-7ff7ed6cf7f0 CloseHandle 2068->2074 2069->2070 2090 7ff7ed6cf781-7ff7ed6cf78c ShowWindow 2069->2090 2070->2074 2096 7ff7ed6cf7af-7ff7ed6cf7b2 2070->2096 2080 7ff7ed6cf805-7ff7ed6cf80c 2074->2080 2081 7ff7ed6cf7f2-7ff7ed6cf803 call 7ff7ed6c13c4 2074->2081 2088 7ff7ed6cf82e-7ff7ed6cf830 2080->2088 2089 7ff7ed6cf80e-7ff7ed6cf811 2080->2089 2081->2080 2081->2088 2088->2059 2095 7ff7ed6cf832-7ff7ed6cf835 2088->2095 2089->2088 2094 7ff7ed6cf813-7ff7ed6cf828 2089->2094 2090->2070 2094->2088 2095->2059 2098 7ff7ed6cf837-7ff7ed6cf845 ShowWindow 2095->2098 2096->2074 2099 7ff7ed6cf7b4-7ff7ed6cf7c5 GetExitCodeProcess 2096->2099 2098->2059 2099->2074 2100 7ff7ed6cf7c7-7ff7ed6cf7dc 2099->2100 2100->2074
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: .exe$.inf$Install$p
                                                                                                                    • API String ID: 1054546013-3607691742
                                                                                                                    • Opcode ID: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                                                                                                                    • Instruction ID: 9001cb94a2918d88606d840e80cdd50b2147ee5bbfb0861cd6ad8a5d619b1b4f
                                                                                                                    • Opcode Fuzzy Hash: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                                                                                                                    • Instruction Fuzzy Hash: CDC18E22F1E60295FA10EB25D950379A7B2AF98BC4F844033DA4D477A5FF3CE4658362

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3569833718-0
                                                                                                                    • Opcode ID: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                                                    • Instruction ID: be12a2335c8822ec684860299e569b22e29185e90977e71bcbb16c340554c13a
                                                                                                                    • Opcode Fuzzy Hash: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                                                                                                                    • Instruction Fuzzy Hash: C241ED31F18A4286F304EF61EC10BAEA761EB89BCCF840136DD0A07B95DE3DE4598765
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                                                                                                                    • Instruction ID: cf3b730a379a3729956ec7fb8ee6ee5159c6ff52010081db963a879decd7023e
                                                                                                                    • Opcode Fuzzy Hash: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                                                                                                                    • Instruction Fuzzy Hash: C8129062F0C74285EB10EB65D4543ADA372EB457E8F800232EA9D17ADAEF3CD585C352

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 3763 7ff7ed6b24c0-7ff7ed6b24fb 3764 7ff7ed6b2506 3763->3764 3765 7ff7ed6b24fd-7ff7ed6b2504 3763->3765 3766 7ff7ed6b2509-7ff7ed6b2578 3764->3766 3765->3764 3765->3766 3767 7ff7ed6b257a 3766->3767 3768 7ff7ed6b257d-7ff7ed6b25a8 CreateFileW 3766->3768 3767->3768 3769 7ff7ed6b2688-7ff7ed6b268d 3768->3769 3770 7ff7ed6b25ae-7ff7ed6b25de GetLastError call 7ff7ed6b6a0c 3768->3770 3771 7ff7ed6b2693-7ff7ed6b2697 3769->3771 3779 7ff7ed6b25e0-7ff7ed6b262a CreateFileW GetLastError 3770->3779 3780 7ff7ed6b262c 3770->3780 3773 7ff7ed6b26a5-7ff7ed6b26a9 3771->3773 3774 7ff7ed6b2699-7ff7ed6b269c 3771->3774 3777 7ff7ed6b26cf-7ff7ed6b26e3 3773->3777 3778 7ff7ed6b26ab-7ff7ed6b26af 3773->3778 3774->3773 3776 7ff7ed6b269e 3774->3776 3776->3773 3782 7ff7ed6b26e5-7ff7ed6b26f0 3777->3782 3783 7ff7ed6b270c-7ff7ed6b2735 call 7ff7ed6d2320 3777->3783 3778->3777 3781 7ff7ed6b26b1-7ff7ed6b26c9 SetFileTime 3778->3781 3784 7ff7ed6b2632-7ff7ed6b263a 3779->3784 3780->3784 3781->3777 3788 7ff7ed6b26f2-7ff7ed6b26fa 3782->3788 3789 7ff7ed6b2708 3782->3789 3785 7ff7ed6b2673-7ff7ed6b2686 3784->3785 3786 7ff7ed6b263c-7ff7ed6b2653 3784->3786 3785->3771 3790 7ff7ed6b2655-7ff7ed6b2668 3786->3790 3791 7ff7ed6b266e call 7ff7ed6d220c 3786->3791 3793 7ff7ed6b26ff-7ff7ed6b2703 call 7ff7ed6a20b0 3788->3793 3794 7ff7ed6b26fc 3788->3794 3789->3783 3790->3791 3796 7ff7ed6b2736-7ff7ed6b273b call 7ff7ed6d7904 3790->3796 3791->3785 3793->3789 3794->3793
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3536497005-0
                                                                                                                    • Opcode ID: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                                                                                    • Instruction ID: c878f6e81967effb608826bbab9ad56d476fffd6ffacd624a692f693288010a2
                                                                                                                    • Opcode Fuzzy Hash: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                                                                                    • Instruction Fuzzy Hash: CC61F462E1C64186E7209B29E50036EA7B2FB887E8F501336DFAD07AD8EF3DD0558715

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                                                                    • String ID: ]
                                                                                                                    • API String ID: 3561356813-3352871620
                                                                                                                    • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                                                    • Instruction ID: dd3f02435733672b3a7be9accea847423a14611fea65da1771c88656bc3d2f3f
                                                                                                                    • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                                                    • Instruction Fuzzy Hash: 82116321F0D64241FA64BB25A654379D393AF88BC4F984036D95D0BB96FE3CE8148722

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1266772231-0
                                                                                                                    • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                                                    • Instruction ID: 1ea3a426cdbe6561ddc7a00d063cafe43a719aebf67a826517bd8a6de7ad9d01
                                                                                                                    • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                                                    • Instruction Fuzzy Hash: 7AF0EC25E3C55282FB50AB24EC95B3AA361BF98789FC05432E64E43894EF3CD518CB11

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                                                    • String ID: EDIT
                                                                                                                    • API String ID: 4243998846-3080729518
                                                                                                                    • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                                                    • Instruction ID: 4436c80657fb65d8c5de147d020370cce5cbf848b088d91f852913b281f25305
                                                                                                                    • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                                                    • Instruction Fuzzy Hash: AC01FB61E1CA4281FA20AB21A8207B6A392AF9C7C9FC41133C94D47695FE3CE1598661

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 4073 7ff7ed6b2ce0-7ff7ed6b2d0a 4074 7ff7ed6b2d13-7ff7ed6b2d1b 4073->4074 4075 7ff7ed6b2d0c-7ff7ed6b2d0e 4073->4075 4077 7ff7ed6b2d1d-7ff7ed6b2d28 GetStdHandle 4074->4077 4078 7ff7ed6b2d2b 4074->4078 4076 7ff7ed6b2ea9-7ff7ed6b2ec4 call 7ff7ed6d2320 4075->4076 4077->4078 4080 7ff7ed6b2d31-7ff7ed6b2d3d 4078->4080 4082 7ff7ed6b2d3f-7ff7ed6b2d44 4080->4082 4083 7ff7ed6b2d86-7ff7ed6b2da2 WriteFile 4080->4083 4084 7ff7ed6b2daf-7ff7ed6b2db3 4082->4084 4085 7ff7ed6b2d46-7ff7ed6b2d7a WriteFile 4082->4085 4086 7ff7ed6b2da6-7ff7ed6b2da9 4083->4086 4087 7ff7ed6b2ea2-7ff7ed6b2ea6 4084->4087 4088 7ff7ed6b2db9-7ff7ed6b2dbd 4084->4088 4085->4086 4089 7ff7ed6b2d7c-7ff7ed6b2d82 4085->4089 4086->4084 4086->4087 4087->4076 4088->4087 4090 7ff7ed6b2dc3-7ff7ed6b2dd8 call 7ff7ed6ab4f8 4088->4090 4089->4085 4091 7ff7ed6b2d84 4089->4091 4094 7ff7ed6b2dda-7ff7ed6b2de1 4090->4094 4095 7ff7ed6b2e1e-7ff7ed6b2e6d call 7ff7ed6d797c call 7ff7ed6a129c call 7ff7ed6abca8 4090->4095 4091->4086 4094->4080 4096 7ff7ed6b2de7-7ff7ed6b2de9 4094->4096 4095->4087 4106 7ff7ed6b2e6f-7ff7ed6b2e86 4095->4106 4096->4080 4098 7ff7ed6b2def-7ff7ed6b2e19 4096->4098 4098->4080 4107 7ff7ed6b2e88-7ff7ed6b2e9b 4106->4107 4108 7ff7ed6b2e9d call 7ff7ed6d220c 4106->4108 4107->4108 4109 7ff7ed6b2ec5-7ff7ed6b2ecb call 7ff7ed6d7904 4107->4109 4108->4087
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite$Handle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4209713984-0
                                                                                                                    • Opcode ID: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                                                                                    • Instruction ID: 586d73c8bfe66b5e05a1955af9864445f2715e14183da63d5bedeeecc9d48181
                                                                                                                    • Opcode Fuzzy Hash: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                                                                                    • Instruction Fuzzy Hash: AE510822E1D54242EB50EB25D54477AA362FF89BD4F840133EA4D476D4EF3CD585C322

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2912839123-0
                                                                                                                    • Opcode ID: f6b19c5786641239495edb38a692ba8cfa3517dae24bead12263da06daead65f
                                                                                                                    • Instruction ID: 2dcbb4f4d9bf76fe4b65f83b8344356deeda4129e33f9b23ede79c400cafd500
                                                                                                                    • Opcode Fuzzy Hash: f6b19c5786641239495edb38a692ba8cfa3517dae24bead12263da06daead65f
                                                                                                                    • Instruction Fuzzy Hash: 06518162F1C65284FF00BBA5E8553ADA323AB457D4F900636DE1C1B6D6EE7CD450C362
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2359106489-0
                                                                                                                    • Opcode ID: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                                                                                    • Instruction ID: 2055f750cc0f37e0d6e23525459d6f54209e3a946174940bfba47dbd91232343
                                                                                                                    • Opcode Fuzzy Hash: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                                                                                    • Instruction Fuzzy Hash: E031A262F1CA4281EA20BB25A454379E353FF887D0FD00232EE9D476A5FF3CD4458626
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1452418845-0
                                                                                                                    • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                                                    • Instruction ID: c40745e2af1d3799910518bad8e8a2b746ab528b383ea8d81b670bf5645d7bd4
                                                                                                                    • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                                                    • Instruction Fuzzy Hash: 1E313D10E0C20345EA54BB65B5313BA92935F893C4FC60437D90E4B2E7FE3DA5288273
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$FileHandleRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2244327787-0
                                                                                                                    • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                                                    • Instruction ID: 27948f418b380cd68232c2aa8a70ddb54f9bbc8f9f5d767db1e362d6fccebe87
                                                                                                                    • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                                                    • Instruction Fuzzy Hash: A521C221E0C61281EA20AF11A60033DE3E2FF89BD4F944532DA4D4F684EF7DD9858723
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6BECD8: ResetEvent.KERNEL32 ref: 00007FF7ED6BECF1
                                                                                                                      • Part of subcall function 00007FF7ED6BECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF7ED6BED07
                                                                                                                    • ReleaseSemaphore.KERNEL32 ref: 00007FF7ED6BE974
                                                                                                                    • CloseHandle.KERNELBASE ref: 00007FF7ED6BE993
                                                                                                                    • DeleteCriticalSection.KERNEL32 ref: 00007FF7ED6BE9AA
                                                                                                                    • CloseHandle.KERNEL32 ref: 00007FF7ED6BE9B7
                                                                                                                      • Part of subcall function 00007FF7ED6BEA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF7ED6BE95F,?,?,?,00007FF7ED6B463A,?,?,?), ref: 00007FF7ED6BEA63
                                                                                                                      • Part of subcall function 00007FF7ED6BEA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7ED6BE95F,?,?,?,00007FF7ED6B463A,?,?,?), ref: 00007FF7ED6BEA6E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 502429940-0
                                                                                                                    • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                                                    • Instruction ID: 5a7d86e612901bf4b4845faa66de3de72b61dd51cab201e4976645d81ff60667
                                                                                                                    • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                                                    • Instruction Fuzzy Hash: FE012D32E18A8192E648EB21E5447ADB322FBC8BC0F404032DB6D57665DF39E5B48751
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Thread$CreatePriority
                                                                                                                    • String ID: CreateThread failed
                                                                                                                    • API String ID: 2610526550-3849766595
                                                                                                                    • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                                                    • Instruction ID: e5d2293a1847ffdba220fd5866fbf571c872fa41c6d6f032e167c684c78122b9
                                                                                                                    • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                                                    • Instruction Fuzzy Hash: E7115B31E1CA4281E714AB14E8413A9F362FB887D8F944137DA8E43669FF7CE595CB21
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DirectoryInitializeMallocSystem
                                                                                                                    • String ID: riched20.dll
                                                                                                                    • API String ID: 174490985-3360196438
                                                                                                                    • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                                                    • Instruction ID: f6fb138ae7a015bb45632dc76dd97c84c2c7e380e1545a9537b4e377dae4ebd4
                                                                                                                    • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                                                    • Instruction Fuzzy Hash: CEF03171A1CA4182E700AF20F81426EF7A0FB88798F804136E98D47694EF7CD159CB11
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6C853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF7ED6C856C
                                                                                                                      • Part of subcall function 00007FF7ED6BAAE0: LoadStringW.USER32 ref: 00007FF7ED6BAB67
                                                                                                                      • Part of subcall function 00007FF7ED6BAAE0: LoadStringW.USER32 ref: 00007FF7ED6BAB80
                                                                                                                      • Part of subcall function 00007FF7ED6A1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6A1FFB
                                                                                                                      • Part of subcall function 00007FF7ED6A129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7ED6A1396
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6D01BB
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6D01C1
                                                                                                                    • SendDlgItemMessageW.USER32 ref: 00007FF7ED6D01F2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3106221260-0
                                                                                                                    • Opcode ID: f7a8a175be1daf3eca109b687688224756fee905e724f508e14b940bc333b7d5
                                                                                                                    • Instruction ID: c986d88292786a879319b34445fcbef49a8f725b3c1417bd9aff353e99d3be55
                                                                                                                    • Opcode Fuzzy Hash: f7a8a175be1daf3eca109b687688224756fee905e724f508e14b940bc333b7d5
                                                                                                                    • Instruction Fuzzy Hash: 4A51D162F0864256EB10BBA1E8553FDA323AB89BC4F800537DE0D5B7DAEE3CD5108361
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Concurrency::cancel_current_task__std_exception_copy_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2371198981-0
                                                                                                                    • Opcode ID: be886d0b0dd0ab9ec10d8091ff35c207a3a05e000928f8ccd12ad683e5eeb367
                                                                                                                    • Instruction ID: 42630643fb1ae70b0325daae142393da8438f710c7a9f4f8317e74b267f263eb
                                                                                                                    • Opcode Fuzzy Hash: be886d0b0dd0ab9ec10d8091ff35c207a3a05e000928f8ccd12ad683e5eeb367
                                                                                                                    • Instruction Fuzzy Hash: 7041C161F1C64585EA04EB12E544379E366EB08BE0F944A32DEBD0BBD5EF7CE0918315
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2272807158-0
                                                                                                                    • Opcode ID: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                                                                                    • Instruction ID: 6ff497486b5f0054a1bd8855e7d9152f180c8e950744e99eba3eab8843cb33af
                                                                                                                    • Opcode Fuzzy Hash: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                                                                                    • Instruction Fuzzy Hash: 3641C372E0C68182EB10EB15E544369A3A2FB897F4F905336DFAD07AD5EF3CD4908611
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2176759853-0
                                                                                                                    • Opcode ID: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                                                                                    • Instruction ID: 3fe131051ff8ebf3cdd13c5ac01f05dcd6864df97c1ed411e14956378da2f6d5
                                                                                                                    • Opcode Fuzzy Hash: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                                                                                    • Instruction Fuzzy Hash: A821B162E1CB8181EA10AB25F94027AA361FB8DBD0F945232EBDD03B95EF3CD1908701
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: std::bad_alloc::bad_alloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1875163511-0
                                                                                                                    • Opcode ID: 65d8091f10f06cce83768fe095ce433e052fa83f4fe25a8c85fad3cbd40ccd0d
                                                                                                                    • Instruction ID: 7d423d33bcd81083ada17a52cde6813d8394848f27dc4e9ac958f13788abd1d8
                                                                                                                    • Opcode Fuzzy Hash: 65d8091f10f06cce83768fe095ce433e052fa83f4fe25a8c85fad3cbd40ccd0d
                                                                                                                    • Instruction Fuzzy Hash: 9C317E52E0DA8651EA24BB14E5443B9A3A2FB94BC4F944033D68C076A9EF7CE956C313
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1203560049-0
                                                                                                                    • Opcode ID: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                                                                                    • Instruction ID: bf0de4ae827cdbf1a781777bdb737e4009fc0e2c6f83dff6e4fd32c277958469
                                                                                                                    • Opcode Fuzzy Hash: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                                                                                    • Instruction Fuzzy Hash: C621FB22F0CA8141EA20AF25F455369A362FFC87D4F904232EE9D476A5FF3DD544C611
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3118131910-0
                                                                                                                    • Opcode ID: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                                                                                    • Instruction ID: acb3b6a2a0b3b03adfa2e2229abc7593097926f83f8af555682f1fe7ad9507a4
                                                                                                                    • Opcode Fuzzy Hash: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                                                                                    • Instruction Fuzzy Hash: 7821A722F1C78181EA10EB25F45436EA362FF88BD4F901232EA9D47AA5EF3CD540C611
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1203560049-0
                                                                                                                    • Opcode ID: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                                                                                    • Instruction ID: fa8ff61be83dc4f499d54906ba5c2d8122729c229afb9689ab69771e71cd1f23
                                                                                                                    • Opcode Fuzzy Hash: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                                                                                    • Instruction Fuzzy Hash: 99214762E1C78181EA10EB29F45532AA362FBC97E4F900232EA9D477E5EF3CD541C615
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1703294689-0
                                                                                                                    • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                                                    • Instruction ID: e504c79c2d254bc3d4ba1e62ef166d79919cfcda22392fb8b057ec2dd054d275
                                                                                                                    • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                                                    • Instruction Fuzzy Hash: 57E01214E0C70546EA547F65686537953635F887C1F50443DCC0E4739AED3DA8194622
                                                                                                                    APIs
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6AF895
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6AF89B
                                                                                                                      • Part of subcall function 00007FF7ED6B3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF7ED6C0811), ref: 00007FF7ED6B3EFD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3587649625-0
                                                                                                                    • Opcode ID: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                                                                                                                    • Instruction ID: 2bf4e0fb1ece5bd8057a21f4f77a5349bbaadd342d75236abe7b2b5a675399d1
                                                                                                                    • Opcode Fuzzy Hash: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                                                                                                                    • Instruction Fuzzy Hash: 18917172E1C68194EB10EB64E4443ADA762FB447D8FD04236FA9C07AE9EF78D545C312
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 64605ea4c96cd6a261f561e4281ee818068104f0c146ac1253270dcee5fc1f01
                                                                                                                    • Instruction ID: 3f166eba91255d9527d9f94a2e7fed95befd7d854273c85cae0601ef6b0830a1
                                                                                                                    • Opcode Fuzzy Hash: 64605ea4c96cd6a261f561e4281ee818068104f0c146ac1253270dcee5fc1f01
                                                                                                                    • Instruction Fuzzy Hash: D041B462F1C65184FB00FBB5D4503EDA362AF44BD8F945136EE5D27AEAEE38D4828311
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF7ED6B274D), ref: 00007FF7ED6B28A9
                                                                                                                    • GetLastError.KERNEL32(?,00007FF7ED6B274D), ref: 00007FF7ED6B28B8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2976181284-0
                                                                                                                    • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                                                    • Instruction ID: 8655ed0b1a5ad6605738716637f65aff99ff732a6250fc80ba42a03d96ae9b4d
                                                                                                                    • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                                                    • Instruction Fuzzy Hash: D231E722F1DD4282EA606B2ADA4077DA392AF48BD4F940132DE1D577A4FE3CD5458262
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1746051919-0
                                                                                                                    • Opcode ID: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                                                                                    • Instruction ID: fbecd5501b7a89a7913c50216763c35c990c2dcab06bc32832f5059e097b7c7b
                                                                                                                    • Opcode Fuzzy Hash: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                                                                                    • Instruction Fuzzy Hash: 8831B022E1C78182EA10AB15F55436AF362EB89BD0F805232EA9D0BBD5EF3CE1508711
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$BuffersFlushTime
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1392018926-0
                                                                                                                    • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                                                    • Instruction ID: 835e56aa05b1dc6710e760b4f1d018a4d3fd56163fb322f891e562754766dc5b
                                                                                                                    • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                                                    • Instruction Fuzzy Hash: D7213662F0DB4259EA62AF11D6003BAD7D2AF097D8F944032DE4C07291FE3CD586CB12
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: LoadString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2948472770-0
                                                                                                                    • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                                                    • Instruction ID: 9b2b2ddb43924b328f66bceea46309551bf297a356838e29d39f9cacc79348fd
                                                                                                                    • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                                                    • Instruction Fuzzy Hash: 27119070F0CA0185EA00AF16AC44268F7A2BB88FD8F94443ACE1D93760EF7CE5918755
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2976181284-0
                                                                                                                    • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                                                    • Instruction ID: 4634e17f8a1fbfbd9a743e06b7fea2f7b9185d31b0a2df0689cef8b4ce37684d
                                                                                                                    • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                                                    • Instruction Fuzzy Hash: 0A11AE21E1C64181EB60AB25E940379A3A1FB49BF8F940732DA7D572D4EF3CE582C312
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemRectTextWindow$Clientswprintf
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3322643685-0
                                                                                                                    • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                                                    • Instruction ID: 8bb57ff74ddf2d07363972b4c16f0d07a27369ef17d38cbfbb36234324941678
                                                                                                                    • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                                                    • Instruction Fuzzy Hash: 80015E20E0D64A41FE59B792A558379D7936F897C8F881036C88D072D9FE7CE8848322
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7ED6BEBAD,?,?,?,?,00007FF7ED6B5752,?,?,?,00007FF7ED6B56DE), ref: 00007FF7ED6BEB5C
                                                                                                                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF7ED6BEB6F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$AffinityCurrentMask
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1231390398-0
                                                                                                                    • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                                                    • Instruction ID: 2242999942cc360ee701a129ebad3759532c7951f8e543f71efb0edcb71bd916
                                                                                                                    • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                                                    • Instruction Fuzzy Hash: A0E0E561F1854642DB089B55C4406E9A393BFC8B80BC48036D60B83615EE3DE2458B01
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1173176844-0
                                                                                                                    • Opcode ID: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                                                    • Instruction ID: 4f121f32547bc059bd16649d191eeb8f9c3286c304e378de6414727e420f431b
                                                                                                                    • Opcode Fuzzy Hash: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                                                    • Instruction Fuzzy Hash: D5E0B640E4D10741F91872662E363B581520F6D3F0EDD5B32DA7E076C6BD3CA4B58172
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 485612231-0
                                                                                                                    • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                                                    • Instruction ID: e2172a6a6c390398a828f8f98e4c04b79420647527ec3a2a7c44eb1e2e9a9319
                                                                                                                    • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                                                    • Instruction Fuzzy Hash: A2E04F50E0D20382FF04BFB2681537493925FEC790F842032C90DCB252FF3D95A18A22
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                                                                                    • Instruction ID: 4d2dffc6a0976713cc7f2065be6d652ddda47e382e20a2e03d512ca8b1de8f50
                                                                                                                    • Opcode Fuzzy Hash: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                                                                                    • Instruction Fuzzy Hash: F9D1B962F0C68156EB68AB6595403B8E7A2FB45BC4F844037CB9D477B1EF38F4648322
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1017591355-0
                                                                                                                    • Opcode ID: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                                                                                    • Instruction ID: 4fc506c1c1b61142efeaeeb6d186f79016a92b76ef7b070f7b27839d60cf1061
                                                                                                                    • Opcode Fuzzy Hash: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                                                                                    • Instruction Fuzzy Hash: 3B61A021E1C64781FA64BA2995143FAD293AF45BD8F944533EE4E07BC5FE7CE8418223
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6BE948: ReleaseSemaphore.KERNEL32 ref: 00007FF7ED6BE974
                                                                                                                      • Part of subcall function 00007FF7ED6BE948: CloseHandle.KERNELBASE ref: 00007FF7ED6BE993
                                                                                                                      • Part of subcall function 00007FF7ED6BE948: DeleteCriticalSection.KERNEL32 ref: 00007FF7ED6BE9AA
                                                                                                                      • Part of subcall function 00007FF7ED6BE948: CloseHandle.KERNEL32 ref: 00007FF7ED6BE9B7
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6C1ACB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 904680172-0
                                                                                                                    • Opcode ID: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                                                                                                                    • Instruction ID: 3c3487f94e68efce25aa539d7c13b3655f8bde90fb5de0a52dcdb22729c77a0d
                                                                                                                    • Opcode Fuzzy Hash: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                                                                                                                    • Instruction Fuzzy Hash: E3618062F1968596EE08EB66D5642BCB366FB40BD0B944133E72D07AC5EF3CE4718311
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                                                                                                                    • Instruction ID: d2d09615f0864f7edcc77686437b03e1d5788a80f843494a0ebb99bd5db3d242
                                                                                                                    • Opcode Fuzzy Hash: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                                                                                                                    • Instruction Fuzzy Hash: 3D51B262F0C68250EA14BB25A4443ADA752FB85BC4F844137EE9D07397EE3DE895C361
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6B3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF7ED6C0811), ref: 00007FF7ED6B3EFD
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6AE993
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1011579015-0
                                                                                                                    • Opcode ID: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                                                                                    • Instruction ID: 85fc181c984cdd6654236c0b360cbb6b6c028ef25b5c6493e65dc00d74d8a229
                                                                                                                    • Opcode Fuzzy Hash: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                                                                                    • Instruction Fuzzy Hash: 63515E22F1C68681FB60AB25D44536DA362FB94BC4F940137EA9D0B6A6EF3CD441C762
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 35ea3b04d8214deea48c115844c26589502cb7cbcbac9db44318e90ece9789cf
                                                                                                                    • Instruction ID: 09c2e6b1dad3f19e7111ea0195526d122a15a6e2a69cde724bc6d7fdb7150eb3
                                                                                                                    • Opcode Fuzzy Hash: 35ea3b04d8214deea48c115844c26589502cb7cbcbac9db44318e90ece9789cf
                                                                                                                    • Instruction Fuzzy Hash: 1541D762F1CA9151EA14AB17A644379E362FB84BC0F848537EE5C4BF9AEF3CD4518300
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                                                                                                                    • Instruction ID: e9fa7212ce83f71702394bb4be6e7351fcdee26ba0d57cb7fc3c79094941c121
                                                                                                                    • Opcode Fuzzy Hash: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                                                                                                                    • Instruction Fuzzy Hash: 4C41E862F0CB0580EE10BF15E545379A3A2EF45BD4F941136EA8D077E9EF3DE4808661
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: HandleModule$AddressFreeLibraryProc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3947729631-0
                                                                                                                    • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                                                    • Instruction ID: 591beeabd835e50e3eb22a93bd4c49ec1e3270a0117c15319aedc594d4d1e563
                                                                                                                    • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                                                    • Instruction Fuzzy Hash: 7A41A411E1C64286FA14BB19E860378A362AF98BC4FC44437DA0D4B6D5FE7DE85087A3
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 680105476-0
                                                                                                                    • Opcode ID: c0d312b4e0c8f4018cd2918558ed466c16d78a5e43cb187cca2cc725d26fc057
                                                                                                                    • Instruction ID: dae8304449e0ef768d5f6695f4e456134ea9896c2d362d57995762dfd854cfb0
                                                                                                                    • Opcode Fuzzy Hash: c0d312b4e0c8f4018cd2918558ed466c16d78a5e43cb187cca2cc725d26fc057
                                                                                                                    • Instruction Fuzzy Hash: 9E218122E0C65185EA14AF52A510379A261EB04BF0FA80B32DFBE47BD1EE7CE0518356
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3215553584-0
                                                                                                                    • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                                                    • Instruction ID: 1b362d166deadb533d11c156eb13a9daa35a48e6541c472aa3353cdeacbc80b0
                                                                                                                    • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                                                    • Instruction Fuzzy Hash: 36115C21D1C6828AE610FB50E850739A2A6BB483C4F950136EA4DC76D6EF3DEA509763
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                                                                                    • Instruction ID: 39d5d5d85011646ca4345cdea346cba3059876283f997bcb8084897204c69a24
                                                                                                                    • Opcode Fuzzy Hash: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                                                                                    • Instruction Fuzzy Hash: 8701A562E1C68541EA11B768E441369B363FB997D0FC05233E6DD0B6A5EF7CD0408715
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6D1604: GetModuleHandleW.KERNEL32(?,?,?,00007FF7ED6D1573,?,?,?,00007FF7ED6D192A), ref: 00007FF7ED6D162B
                                                                                                                    • DloadProtectSection.DELAYIMP ref: 00007FF7ED6D15C9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DloadHandleModuleProtectSection
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2883838935-0
                                                                                                                    • Opcode ID: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                                                                                    • Instruction ID: 2884e6b47b335cf623f57503e23109ddf411cc4ec78ebe998340e256a5b01a01
                                                                                                                    • Opcode Fuzzy Hash: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                                                                                    • Instruction Fuzzy Hash: E211ACA0D0C94781FB50BB05A8613709362AF5838CF981037D90D4B2E1FEFCA5A58662
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6B40BC: FindFirstFileW.KERNELBASE ref: 00007FF7ED6B410B
                                                                                                                      • Part of subcall function 00007FF7ED6B40BC: FindFirstFileW.KERNELBASE ref: 00007FF7ED6B415E
                                                                                                                      • Part of subcall function 00007FF7ED6B40BC: GetLastError.KERNEL32 ref: 00007FF7ED6B41AF
                                                                                                                    • FindClose.KERNELBASE(?,?,00000000,00007FF7ED6C0811), ref: 00007FF7ED6B3EFD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1464966427-0
                                                                                                                    • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                                                    • Instruction ID: b6f63129f3851c03fac35c275ff44dd03a37d2f439993decff0e63442f52496e
                                                                                                                    • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                                                    • Instruction Fuzzy Hash: 01F0A462E0C28185DA10BB75A500379B7629F19BF4F541336EA3D073E7DE38D4448766
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 749574446-0
                                                                                                                    • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                                                    • Instruction ID: 2d8ff7be4b491cf40c5af5847d0026af32347a81eac15a6152d958f244c1e86e
                                                                                                                    • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                                                    • Instruction Fuzzy Hash: 2CE0C212F2891582EF20BB3AC8427389362EF8CFC4B881072CE0C4B331DE39C5858A55
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileType
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3081899298-0
                                                                                                                    • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                                                    • Instruction ID: 71be5955b34736f85ca18068078efe1c65dc45a771b5b1c2de06fb33f06f5e2e
                                                                                                                    • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                                                    • Instruction Fuzzy Hash: A9D02212D0D40082DE00B335D84123C6381AF8B374FE00332C63EC3AE1CE3E9086A322
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentDirectory
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1611563598-0
                                                                                                                    • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                                                    • Instruction ID: d2546429bc34374496d242ec72c37ed25424fdafe4049530811da3707a9dfe1b
                                                                                                                    • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                                                    • Instruction Fuzzy Hash: 5DC08C20F09602C1DA08AB26C8C921813AABB94B44BB04036C50CC6120EE3DC6EA939E
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocHeap
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4292702814-0
                                                                                                                    • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                                                    • Instruction ID: 7d54f6910ef233da067c458b075c49b02bc9d010933ed1f216a8c45d0c1d12bc
                                                                                                                    • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                                                    • Instruction Fuzzy Hash: 58F04F51F0D64785FE547765A9213B592925FC8BC8F8C5432C90D8B3C1FE3CA6A14172
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2962429428-0
                                                                                                                    • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                                                    • Instruction ID: d6dd4ffc1033350c7307e5db1f63b1b013b7c426f1ffe17994fe5c6cf96f92ba
                                                                                                                    • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                                                    • Instruction Fuzzy Hash: 8EF0A921E0C58245FB249B20D541379A7A2DB18BF8F885336D73D061D4EF38D8A58321
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocHeap
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4292702814-0
                                                                                                                    • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                                                    • Instruction ID: c596aacec03dea458927b363e08bf93b57b054301cb31242f344f9faef831f80
                                                                                                                    • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                                                    • Instruction Fuzzy Hash: 74F03A11E0D34644FF547AB168203B592925F987E0F887632D96E8B2C1FF3EA4608932
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                                                    • API String ID: 2659423929-3508440684
                                                                                                                    • Opcode ID: 00964161ca9ce986acf484eb71c93c2db3db382fc2b8f17ad7e68b1fb415a3bc
                                                                                                                    • Instruction ID: fd06cd78fa8045714264f89c2fd0f333d4f2f191c95f4093d033bae8f1ff27b2
                                                                                                                    • Opcode Fuzzy Hash: 00964161ca9ce986acf484eb71c93c2db3db382fc2b8f17ad7e68b1fb415a3bc
                                                                                                                    • Instruction Fuzzy Hash: 4B62BF62F0C64285FB00EB74D4543ADA362AB857E4F914233DAAD57AD9EF3CE185C312
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                                                    • String ID: %ls$%s: %s
                                                                                                                    • API String ID: 2539828978-2259941744
                                                                                                                    • Opcode ID: 424a1e263fd4ea943b566bb6394ea34e411eb33a20c874d1edcb03b8c882655e
                                                                                                                    • Instruction ID: 00e98b3d987c54227d6d57e7a61ab7d4b8bd5114c0a8f186934412c9b0b58883
                                                                                                                    • Opcode Fuzzy Hash: 424a1e263fd4ea943b566bb6394ea34e411eb33a20c874d1edcb03b8c882655e
                                                                                                                    • Instruction Fuzzy Hash: 8CB27662E1C68281EA10BB25E4543BAE322EFD97D0F904237E69D476E6FE7CD540C712
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                    • API String ID: 1759834784-2761157908
                                                                                                                    • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                                                    • Instruction ID: 2cabf3a4fde44ee2c95e829476cc223293883523ff438461d04eceb598c2a2b5
                                                                                                                    • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                                                    • Instruction Fuzzy Hash: 35B20972E0C1828AE725AE25D5407FDB793FB4C3C8F905136DE0A97B94EB39E6048B51
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                                                    • String ID: rtmp
                                                                                                                    • API String ID: 3587137053-870060881
                                                                                                                    • Opcode ID: 2d571345357ed831951e913cf5b34db2d9c750839b47aacb8777740eed476449
                                                                                                                    • Instruction ID: 8ccd88fb510df8f794692213bb2afd110171048da27141d76dbfa433c3218187
                                                                                                                    • Opcode Fuzzy Hash: 2d571345357ed831951e913cf5b34db2d9c750839b47aacb8777740eed476449
                                                                                                                    • Instruction Fuzzy Hash: 2CF1D022F1CA8295EB10EB65D4902BDA7B2EB853C4F901133EA4D47AE9EF3CD584C751
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1693479884-0
                                                                                                                    • Opcode ID: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                                                                                    • Instruction ID: 59cb76c462fc0837abe3d982e69e40a4211b729025895c42b30127d2b07bca35
                                                                                                                    • Opcode Fuzzy Hash: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                                                                                    • Instruction Fuzzy Hash: 8DA1A772F18B5144FE10EB7998542FCA323AB49BE8B945236DE5D17BD9EF3CE0428211
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3140674995-0
                                                                                                                    • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                                                    • Instruction ID: 83fe68c33e4d97458f71070370918a707b1c7682de292e1754705ebfb33d4d49
                                                                                                                    • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                                                    • Instruction Fuzzy Hash: 3A316572A09B8189EB60AF60E8503ED7361FB84784F84443ADA4D47B99EF3CD658C720
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1239891234-0
                                                                                                                    • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                                                    • Instruction ID: f196e898f399c815b9fd6de9a15668333175cf75504889e664af31f84836aca0
                                                                                                                    • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                                                    • Instruction Fuzzy Hash: 9C318532A08B8185DB20EF65E8503AEB3A1FB88794F900136EE9D47B99EF3CC555C711
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3668304517-0
                                                                                                                    • Opcode ID: 62daf4ca79de1f061943721c82fe4b1d8a79ca39ff2b6a03206309b778900290
                                                                                                                    • Instruction ID: 059be13df106b488bfdaf6b1a06c16b81bef24fdc2df4dbeb443257c009ebe6b
                                                                                                                    • Opcode Fuzzy Hash: 62daf4ca79de1f061943721c82fe4b1d8a79ca39ff2b6a03206309b778900290
                                                                                                                    • Instruction Fuzzy Hash: E6B1C022E1868685EA10BB65D8503ADA372FB897D4F905632EA8D07BD9FF3CE544C311
                                                                                                                    APIs
                                                                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7ED6DFAC4
                                                                                                                      • Part of subcall function 00007FF7ED6D7934: GetCurrentProcess.KERNEL32(00007FF7ED6E0CCD), ref: 00007FF7ED6D7961
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                                                    • String ID: *?$.
                                                                                                                    • API String ID: 2518042432-3972193922
                                                                                                                    • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                                                    • Instruction ID: d52ff6607ed9e1aa04e91e21f773a0f6cca4a0d36ebda221249c8726976983e8
                                                                                                                    • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                                                    • Instruction Fuzzy Hash: 0651EB62F1979541EF10FF61A8206B9A396FB54BD8B844532DE1D17B85FF3CD0528321
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy_s
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1502251526-0
                                                                                                                    • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                                                    • Instruction ID: 3e5002311f8386d42583b06a77e40166c5479273bc6d1a702a988aba2054cbed
                                                                                                                    • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                                                    • Instruction Fuzzy Hash: D9D1B432B1C68687DB24DF15E28476AB792F79C784F848135CF4E97B44EA3DEA458B00
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFormatFreeLastLocalMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1365068426-0
                                                                                                                    • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                                                    • Instruction ID: 37db665d7fd316f521b60ba005e89f7f92880c82f924c0d6c701267d1ef375ff
                                                                                                                    • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                                                    • Instruction Fuzzy Hash: 24011771E0C74182D710AF16B45027AE356FB8D7C0F844036DA8D87B45EF3CD5158711
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: .
                                                                                                                    • API String ID: 0-248832578
                                                                                                                    • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                                                    • Instruction ID: 2c0d667f3bf6e99b6fbba627c31d18adc599bc130f0468359125a2042d2ece8b
                                                                                                                    • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                                                    • Instruction Fuzzy Hash: 0D310B22F0C6D145F720BB36B8147B9EA92AB94BE8F948236DE5C47BD5DE3CD5118301
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionRaise_clrfp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 15204871-0
                                                                                                                    • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                                                    • Instruction ID: 098adbcd3bcd155afa5f29e1461ae5ca7c028ebfaf20f39fbcfe6b6c96607672
                                                                                                                    • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                                                    • Instruction Fuzzy Hash: E0B18C73A04B848BEB15CF29C84636CBBA1F748B8CF148926DE5E837A4DB3AD451C711
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectRelease$CapsDevice
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1061551593-0
                                                                                                                    • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                                                    • Instruction ID: a19ecd1b61d58e0608b4e7377c4d65c972bedb06e950522e775202c499caf7fb
                                                                                                                    • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                                                    • Instruction Fuzzy Hash: 23812936F08A0586EB209F6AD4406ADB772FB88B88F414123DE0D5BB64EF39D549C791
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FormatInfoLocaleNumber
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2169056816-0
                                                                                                                    • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                                                    • Instruction ID: b588b6c2bf830b430469f88e63ad8225ccd370f57dc9aa0a65eef5f3848e0095
                                                                                                                    • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                                                    • Instruction Fuzzy Hash: 80115C22A0CB8195E761AF11E8103E9B361FF88B84FC44136DA4D47754EF3CD159C756
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6B24C0: CreateFileW.KERNELBASE ref: 00007FF7ED6B259B
                                                                                                                      • Part of subcall function 00007FF7ED6B24C0: GetLastError.KERNEL32 ref: 00007FF7ED6B25AE
                                                                                                                      • Part of subcall function 00007FF7ED6B24C0: CreateFileW.KERNEL32 ref: 00007FF7ED6B260E
                                                                                                                      • Part of subcall function 00007FF7ED6B24C0: GetLastError.KERNEL32 ref: 00007FF7ED6B2617
                                                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7ED6B15D0
                                                                                                                      • Part of subcall function 00007FF7ED6B3980: MoveFileW.KERNEL32 ref: 00007FF7ED6B39BD
                                                                                                                      • Part of subcall function 00007FF7ED6B3980: MoveFileW.KERNEL32 ref: 00007FF7ED6B3A34
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 34527147-0
                                                                                                                    • Opcode ID: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                                                                                    • Instruction ID: 9deec26f087bb23a016223cac60a44bf81c62c306b433af4a77a8e034251730b
                                                                                                                    • Opcode Fuzzy Hash: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                                                                                    • Instruction Fuzzy Hash: 8C91AE62F2CA4692EB10EB66D4443AEA362FB94BC4F804033EE4D47B95EE3CD555C361
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Version
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1889659487-0
                                                                                                                    • Opcode ID: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                                                    • Instruction ID: 64106566f5956a2d7af9f41fbe518a587031a39b2f31733f9c53619a21cb5fd6
                                                                                                                    • Opcode Fuzzy Hash: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                                                    • Instruction Fuzzy Hash: C5018F71D5D5828DFA31BB20A8143B5EB969FE939DFC50136C59C07291EE3CB0588A36
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID: 0
                                                                                                                    • API String ID: 3215553584-4108050209
                                                                                                                    • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                                                    • Instruction ID: 399424cdc8a42975c81ddfc49bb3d0c3de0614bf9b9e41111885200304a3ee3a
                                                                                                                    • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                                                    • Instruction Fuzzy Hash: 4D812811E1C10246EAA8BB15A06877DA392EFD47C4F941633DD098F6D5EF3DE829C722
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID: 0
                                                                                                                    • API String ID: 3215553584-4108050209
                                                                                                                    • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                                                    • Instruction ID: 4e4f77d40e7128cf797fb35018eaf6d0107adf9adcbcedf9f5a299066eb1bb72
                                                                                                                    • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                                                    • Instruction Fuzzy Hash: 43711611E0C24246EA64BA15B06837DA3929FC17C4F981533DD098F686EE3DE866C773
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: gj
                                                                                                                    • API String ID: 0-4203073231
                                                                                                                    • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                                                    • Instruction ID: 9ba2a18fa71f726e9b1197d54bcf31dad3d6181e23a4e9008308244427af5821
                                                                                                                    • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                                                    • Instruction Fuzzy Hash: 5F519237B286908BD724CF25E400A9EB3A5F388798F455126EF4A93B09DB3DE955CF40
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: @
                                                                                                                    • API String ID: 0-2766056989
                                                                                                                    • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                                                    • Instruction ID: 9dc54f8a76f5b30283dd6110ad043d77b0a4b27de523503731694e52dfe1fa2f
                                                                                                                    • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                                                    • Instruction Fuzzy Hash: 9841B532B18A4485EF04EF2AE4242A9B7A2A75CFD0B9D9037DE1D8B754EE7DD051C301
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: HeapProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 54951025-0
                                                                                                                    • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                                                    • Instruction ID: 78777f9d5d4ad4190e8695a7af69043c99502aaddc7ec1f419a833c1b43a8d13
                                                                                                                    • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                                                    • Instruction Fuzzy Hash: A5B09220E1BA02C2EA483B516C8635463A5BF8C740FD8903AC50C82320EE3D29B54722
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                                                    • Instruction ID: 4c5d86cea00000b4f703778b820255145c8e674c2d3c0a0cf180b8584e6ba2aa
                                                                                                                    • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                                                    • Instruction Fuzzy Hash: C982D1A2E0D6C18AD705EF68D4043BCBBA2E755BC8F598137CA5A47395EA3CE445C321
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                                                    • Instruction ID: f038b4fae552bf26776d6c067a15a3896bea43b64e6971503deff71cdb5aff77
                                                                                                                    • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                                                    • Instruction Fuzzy Hash: DB627E9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                                                    • Instruction ID: e8708b4f69c56f290a79306dffbe418906e43686928398a73d23ebd8791509e3
                                                                                                                    • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                                                    • Instruction Fuzzy Hash: 0682E0B2E0D6C18AD724DE28D8547FCBBA2E755B88F488137CA4D47785EA3CD485C722
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                                                    • Instruction ID: 8d2edcebb163da8f1b4b8fbb094af8042fc0dcffc6a7eb882a1237d9b042d031
                                                                                                                    • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                                                    • Instruction Fuzzy Hash: 0522F3B3B246508BD728CF25D89AE5E3766F798344B4B8229DF0ACB785DB38D505CB40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                                                    • Instruction ID: 289233d7145c633bb2ace55fed6236eb88eb0eccf20f34066b49d95e16f6fb52
                                                                                                                    • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                                                    • Instruction Fuzzy Hash: 1C32D272E081918BE718DF24D9547BC77A2F754B88F41813ADA4A87B88EB3CF864C751
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                                                    • Instruction ID: 60e26fd187f8ebed6421c339f4e8858bbabb11deb15a16286cd55f4205f407de
                                                                                                                    • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                                                    • Instruction Fuzzy Hash: 4FC19AB7B281908FE350CF6AE400A9D7BB1F39878CB519125DF59A7B09D639E605CB40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                                                    • Instruction ID: f9de2f6da0a6ec9c4fc17378893d102d906f9921aaf8d69b79707e8d56151984
                                                                                                                    • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                                                    • Instruction Fuzzy Hash: 6CA12573E0C18686EB15EA24D5047BDB693EBA87C4F994136DE4907786EE3CE841C322
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                                                    • Instruction ID: 8cf740fc795e8313532ba44679ee69daf7d5f468e8aac95fcd07cfe6f7ed2694
                                                                                                                    • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                                                    • Instruction Fuzzy Hash: 57C1E477E292E04DE302CBB5A4248FD3FB2E71D34DB4A4152EFA657B4AD5385201DB60
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 190572456-0
                                                                                                                    • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                                                    • Instruction ID: 2f285794e47f0c0210e7ec601b14ed1380f165a28d3bae07410c222c50127be8
                                                                                                                    • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                                                    • Instruction Fuzzy Hash: F6910D62E1C58196EB11EF29E4503EDA722FF957C8F841032EF8E47659EE38E646C311
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                                                    • Instruction ID: 640903f1009a0d84987d8ca43af2f9cc19c523f319648cca83d8881cc6acbf17
                                                                                                                    • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                                                    • Instruction Fuzzy Hash: 1D612123F1C5D049EB11DF7985006FDBBA2EB197C4B868033CE9A53646EA38E506CB21
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                                                    • Instruction ID: 91276156fd3667208a87f6ece0bf33842f8444632b1ef08abc63ce3230aad77a
                                                                                                                    • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                                                    • Instruction Fuzzy Hash: 30510073E1C1514BE728DF28A2147ADB752FB88B88F844136DE494B689EE3DE541CB11
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                                                    • Instruction ID: 4c4b8d96cd4bf71426369f16c3f68ccc813e6e63771f87b46553fb17a886f73f
                                                                                                                    • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                                                    • Instruction Fuzzy Hash: 9131D2A2E0C6914FDB08EE1A965037EB792F784384F44813ADF4A83B42EA7CE041C711
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                                                    • Instruction ID: 4c50f49dfe191f73e43f2fe84e788ed377e1483234a99e677b021d5c7b5cb8e1
                                                                                                                    • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                                                    • Instruction Fuzzy Hash: 6CF0FE61F9C00742FB68202858193B9905F9B11394FE46837D12FCF2C6FBBDE881192B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                                                    • Instruction ID: c9a5b76bbd97da8507bca708584af1540f43c20ba1141a78290708645483750b
                                                                                                                    • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                                                    • Instruction Fuzzy Hash: 34A001A1D0CC82D0E654AB50A960270A322BB94380B910032E40D861B9AE3DA9118222
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                                                    • API String ID: 3668304517-727060406
                                                                                                                    • Opcode ID: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                                                                                    • Instruction ID: f422420a515bcf1f082ba4c9d267bf97ce1e9093d0633063926caff8942a69f3
                                                                                                                    • Opcode Fuzzy Hash: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                                                                                    • Instruction Fuzzy Hash: E041F736E09F0199EB00AB60E4403E873A6EB58798F800237DE4C57759FF39D265C391
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                                                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                    • API String ID: 2565136772-3242537097
                                                                                                                    • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                                                    • Instruction ID: acce4564a556eec02c046142e98fac33ab832b5023e7ce78be36bea2acc839fb
                                                                                                                    • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                                                    • Instruction Fuzzy Hash: 11213260E0DA0391FA15BB11F965374A362AF8C7C4FC90037CC0E8B6A1FE3DA5658322
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                                                    • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                                                    • API String ID: 4097890229-4048004291
                                                                                                                    • Opcode ID: 49a63e71edebf0e47042e7ea65e43b03e9a3fa67d865ab852c8f354cac801883
                                                                                                                    • Instruction ID: dd2d855fabb6cff127b9dda3d8d8ecf07e0c31417e593c09d35769438df5df61
                                                                                                                    • Opcode Fuzzy Hash: 49a63e71edebf0e47042e7ea65e43b03e9a3fa67d865ab852c8f354cac801883
                                                                                                                    • Instruction Fuzzy Hash: 3312A062F0CB4284EA10EB65D4542ADA372EB85BC8F904137DA9D0BBE9EF3CD545C361
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                                                                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                                                    • API String ID: 431506467-1315819833
                                                                                                                    • Opcode ID: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                                                                                    • Instruction ID: 7fc59b2a36f3345e94136f12e73b50693328aa309c7c93ea9902f9b78dc77862
                                                                                                                    • Opcode Fuzzy Hash: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                                                                                    • Instruction Fuzzy Hash: B2B1BF62F1D74285FB00EB65D4543AC6362AB893D8F804236DE5D2BAD9EE3CE155C322
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                                                    • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                                                    • API String ID: 2868844859-1533471033
                                                                                                                    • Opcode ID: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                                                                                    • Instruction ID: cf5c52dd6e0a3ecaf111a72dc97da950d793454ec42756beb10009b9835d7cdf
                                                                                                                    • Opcode Fuzzy Hash: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                                                                                    • Instruction Fuzzy Hash: 49818F62F1CA4285EB00EBA5D4503EDA372AF487D8F840137DE1D1BA99FE38D516C366
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                                                    • API String ID: 3215553584-2617248754
                                                                                                                    • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                                                    • Instruction ID: f7f6b9beca55a7ab2da742ef85c92777ec276fe42ef2f25287ec9f2f26f7eba3
                                                                                                                    • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                                                    • Instruction Fuzzy Hash: A041DD32E09B4188E700EF24E8517AD73A6EB183D4F814136EE9C47B49EE3DD125C355
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                                                                    • String ID: STATIC
                                                                                                                    • API String ID: 2845197485-1882779555
                                                                                                                    • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                                                    • Instruction ID: 7b0714fa1d5b707a8c894a523f000cb064192f518d4ff00f85d409e310258584
                                                                                                                    • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                                                    • Instruction Fuzzy Hash: E131C821F0DA4242FA60BB12A9547BDA3A2BF8CBC4F814432DD4D07B96FE3CD4058761
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemTextWindow
                                                                                                                    • String ID: LICENSEDLG
                                                                                                                    • API String ID: 2478532303-2177901306
                                                                                                                    • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                                                    • Instruction ID: 0fe41acdfbcdfb155d32531a7697bc45f1871cbfd68f077253aa1bfcfed36fba
                                                                                                                    • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                                                    • Instruction Fuzzy Hash: B7419F21F0CB5282FB54AB15A81477DA7A2AF88BC8F944037D90E07B95EF3CE5558362
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                                                    • API String ID: 2915667086-2207617598
                                                                                                                    • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                                                    • Instruction ID: d3c9a0361444da9cb7e59e4784cf6e767b5776913535653ba9dd4d20aa216794
                                                                                                                    • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                                                    • Instruction Fuzzy Hash: 96315A20E0DB4280FA14BB19E854375A3A2EF88BD4F841137DD4E877A4FE3DE9558322
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: $
                                                                                                                    • API String ID: 3668304517-227171996
                                                                                                                    • Opcode ID: f030c4eb17d52201791ace9f286aabb5ba9f942de39f9151f6af03753080fb30
                                                                                                                    • Instruction ID: 3ad6bf4dbf2c33a3e4ec5e2aeeff5519843a4783a6a8f1bd3355acb0641d3ed3
                                                                                                                    • Opcode Fuzzy Hash: f030c4eb17d52201791ace9f286aabb5ba9f942de39f9151f6af03753080fb30
                                                                                                                    • Instruction Fuzzy Hash: 47F1E162F1C74240EE20AB65D4542BCA363AB54BE8F815632CA5D1B7D9FF7CE084C362
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                                                    • String ID: csm$csm$csm
                                                                                                                    • API String ID: 2940173790-393685449
                                                                                                                    • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                                                    • Instruction ID: 4cc9c42422f7b34e03fcbda1bfc243cc4a12181d214437984c7ec0acd1305717
                                                                                                                    • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                                                    • Instruction Fuzzy Hash: 10E1B272D0C7828AE710BF64E4A03ADB7A1FB4678CF940136DA8D47A55EF38E495C712
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocClearStringVariant
                                                                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                                                    • API String ID: 1959693985-3505469590
                                                                                                                    • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                                                    • Instruction ID: 8ce0faaad88994b5a22afe87a8c5762eb183490f7416ba954338232d2c9cc412
                                                                                                                    • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                                                    • Instruction Fuzzy Hash: E1714B36A18A0585EB20EF25E8806ADB7B5FB88BD8F805133DE4D47B64EF39D544C351
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7ED6D74F3,?,?,?,00007FF7ED6D525E,?,?,?,00007FF7ED6D5219), ref: 00007FF7ED6D7371
                                                                                                                    • GetLastError.KERNEL32(?,?,00000000,00007FF7ED6D74F3,?,?,?,00007FF7ED6D525E,?,?,?,00007FF7ED6D5219), ref: 00007FF7ED6D737F
                                                                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7ED6D74F3,?,?,?,00007FF7ED6D525E,?,?,?,00007FF7ED6D5219), ref: 00007FF7ED6D73A9
                                                                                                                    • FreeLibrary.KERNEL32(?,?,00000000,00007FF7ED6D74F3,?,?,?,00007FF7ED6D525E,?,?,?,00007FF7ED6D5219), ref: 00007FF7ED6D73EF
                                                                                                                    • GetProcAddress.KERNEL32(?,?,00000000,00007FF7ED6D74F3,?,?,?,00007FF7ED6D525E,?,?,?,00007FF7ED6D5219), ref: 00007FF7ED6D73FB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                    • String ID: api-ms-
                                                                                                                    • API String ID: 2559590344-2084034818
                                                                                                                    • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                                                    • Instruction ID: d2f621655db13084f361ff27f031f73405a7bb3c4fa35628da668fe72bb90796
                                                                                                                    • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                                                    • Instruction Fuzzy Hash: D5319321E1E64281EE12BB06B810775A396FF48BE0F9A4536DD1E4B344FF3CE4518722
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(?,?,?,00007FF7ED6D1573,?,?,?,00007FF7ED6D192A), ref: 00007FF7ED6D162B
                                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7ED6D1573,?,?,?,00007FF7ED6D192A), ref: 00007FF7ED6D1648
                                                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF7ED6D1573,?,?,?,00007FF7ED6D192A), ref: 00007FF7ED6D1664
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                                                    • API String ID: 667068680-1718035505
                                                                                                                    • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                                                    • Instruction ID: 81761eaf26387584c322b137a794b0d735a2dc8b73fb3614cbfd2a7ef7fcad89
                                                                                                                    • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                                                    • Instruction Fuzzy Hash: 9A111820E4EB8381EE65BB00B96037492A26F487D4FCD4437C81D8B3D0FEBDA5658622
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00007FF7ED6B51A4: GetVersionExW.KERNEL32 ref: 00007FF7ED6B51D5
                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BED8C
                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BED98
                                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BEDA8
                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BEDB6
                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BEDC4
                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7ED6A5AB4), ref: 00007FF7ED6BEE05
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2092733347-0
                                                                                                                    • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                                                    • Instruction ID: eff124cba84399a59dd38a607566fb1cabcb40c238378247b5d3da0800b82b89
                                                                                                                    • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                                                    • Instruction Fuzzy Hash: E4517DB2F146518EEB14DFA8D4402AC77B2F748788BA0403ADE0D67B58EF38D556C750
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2092733347-0
                                                                                                                    • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                                                    • Instruction ID: 3402c3df4fa5e5fb3a500059ef7fbcd2172c97c4d830aacafa7f4274382494ef
                                                                                                                    • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                                                    • Instruction Fuzzy Hash: EC315B62F14A518DFB00DFB5E8902AC7771FF08798B94502AEE0DA7A68EF38D595C311
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: .rar$exe$rar$sfx
                                                                                                                    • API String ID: 3668304517-630704357
                                                                                                                    • Opcode ID: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                                                                                    • Instruction ID: fbadd378434d83ff00666204ba240baed453ad7c06572f566d9677bf3deea15e
                                                                                                                    • Opcode Fuzzy Hash: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                                                                                    • Instruction Fuzzy Hash: C2A19F22E1CB0650EA00BF25D4553B8A362AF54BD8F941237DE1D0B6D5EF3CE551C362
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: abort$CallEncodePointerTranslator
                                                                                                                    • String ID: MOC$RCC
                                                                                                                    • API String ID: 2889003569-2084237596
                                                                                                                    • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                                                    • Instruction ID: 325b3a866a552c5d0baaad850a25074be752d28e953ecfb0f83cab89f9e31420
                                                                                                                    • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                                                    • Instruction Fuzzy Hash: 8D91BD73E08B818AE710EF65E4503ADBBA1F745788F50412AEE8C07B59EF38D1A5CB11
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                    • String ID: csm$f
                                                                                                                    • API String ID: 2395640692-629598281
                                                                                                                    • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                                                    • Instruction ID: 27f89370322504d787b86aac2b584e655538ee8c110cad2bcc97a0e8234c4d65
                                                                                                                    • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                                                    • Instruction Fuzzy Hash: 0A51C232E1D20286DB14FB15F854B39B396FB45BCCF908032DA1A47B48EF79E9518752
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                                                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                                                    • API String ID: 2102711378-639343689
                                                                                                                    • Opcode ID: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                                                                                    • Instruction ID: a8858dc15f0002c8b7d9a2c6fc68fd705c2cd2dc21429a47c8f785f115bc0ccb
                                                                                                                    • Opcode Fuzzy Hash: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                                                                                    • Instruction Fuzzy Hash: D851E462F1C65245FB00FB65D8503BDA7A2AF887E8F801132DE5D176D6FE3CA485C222
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Show$Rect
                                                                                                                    • String ID: RarHtmlClassName
                                                                                                                    • API String ID: 2396740005-1658105358
                                                                                                                    • Opcode ID: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                                                    • Instruction ID: b0d3fb45564865c77573ab16d5f258a5412512fa017dbc618a600b0daea319ce
                                                                                                                    • Opcode Fuzzy Hash: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                                                    • Instruction Fuzzy Hash: 03519421A0CB428AEA24AF25E45437EE7A1FF897C0F844436DE8E47B95EF3CE4458711
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: sfxcmd$sfxpar
                                                                                                                    • API String ID: 3540648995-3493335439
                                                                                                                    • Opcode ID: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                                                                                    • Instruction ID: e4fbf7ee9fe8537604d18eaba42b233cddec37b9bb5ce4a3e6816925f381656d
                                                                                                                    • Opcode Fuzzy Hash: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                                                                                    • Instruction Fuzzy Hash: C0319432E18A0584EB00EF65E4843AC7372FB48BD8F941132DE5D5B7A9EE38E155C355
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                                    • API String ID: 0-56093855
                                                                                                                    • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                                                    • Instruction ID: a9e5d166a4ba1b9b43ec9778d33859deb3922c9422ea2a3fb0630315b9572eca
                                                                                                                    • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                                                    • Instruction Fuzzy Hash: DC210721D0DB4780FA10AB19B844374E7A2EB4DBC8F940437D98D472A0FE3CE5A98362
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                    • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                                                    • Instruction ID: 2cb6999c5e03d12bcbbcaa7f13e573ea8d2b25d0539438fd84afadce294ea0b8
                                                                                                                    • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                                                    • Instruction Fuzzy Hash: 71F04F21E1DA4281EE44AB11F454379A362EF8C7D4F851037ED4F87664EE3EE5848721
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3215553584-0
                                                                                                                    • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                                                    • Instruction ID: 78c08d5f10b108593cd9be9b475228476b9874087d572ae5dab0216a41720cf4
                                                                                                                    • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                                                    • Instruction Fuzzy Hash: E681D222E1C65249FB10BB7198403BDA7A2BB49BC8F804137CD0E97695EF3EE515C722
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2398171386-0
                                                                                                                    • Opcode ID: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                                                                                    • Instruction ID: 2df34b2235944fadd8b9df1aedee46fd2704ff62ae7fe39eb1b38bdf89762cc9
                                                                                                                    • Opcode Fuzzy Hash: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                                                                                    • Instruction Fuzzy Hash: 1C51D322F0CA0249FB10EFA5E4503BDA372AB987E8F804636DE1D477E9EF3895158311
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3659116390-0
                                                                                                                    • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                                                    • Instruction ID: ae854ae13a01b3c2dbcbdfa77803ad006297704d80b396255f53e36d95702a98
                                                                                                                    • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                                                    • Instruction Fuzzy Hash: C351F332E18A5189E710DB35D4403ACBB72FB587D8F448136CE0A97B99EF39E145C721
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 262959230-0
                                                                                                                    • Opcode ID: 7e9601d2247a13adf5892490d0984888a090eff7ba9d3fa4ff308a8b8e371313
                                                                                                                    • Instruction ID: 5d17423b1ff6dd5bef7a7314aa0f9ad2dd1bfcc865d571b7e26b5917351b999b
                                                                                                                    • Opcode Fuzzy Hash: 7e9601d2247a13adf5892490d0984888a090eff7ba9d3fa4ff308a8b8e371313
                                                                                                                    • Instruction Fuzzy Hash: 3C410931E0C74589EB14BF61A420378A2E2EF48BE4F944636EA2D877D5EF7CD1618321
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 190572456-0
                                                                                                                    • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                                                    • Instruction ID: 318cbf0895123c816e76bc31f27f48a5df061102eada2fa4388a79459bb9e334
                                                                                                                    • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                                                    • Instruction Fuzzy Hash: B041D061F0DA8281FA15BF12B8107B5A296BF58BD4F994537DD1E8B644FE3CE4108322
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _set_statfp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1156100317-0
                                                                                                                    • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                                                    • Instruction ID: 26445083109634d19684735df288602d39542f006028903e2aa8685716b0f10c
                                                                                                                    • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                                                    • Instruction Fuzzy Hash: 4B11BE36E1C71781FA142124E0423798443AF4C3E8EC84232EE7F8B1D6FE7EAA504123
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3621893840-0
                                                                                                                    • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                                                    • Instruction ID: c8fbe9154eeb4001dc44ea6521fda409d3425e12496eb4bf579811f8a8a82444
                                                                                                                    • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                                                    • Instruction Fuzzy Hash: 24F06221F3C44692F710A720E854B7AA212FFECB89FC41032E94E82994EE3CD159C721
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: __except_validate_context_recordabort
                                                                                                                    • String ID: csm$csm
                                                                                                                    • API String ID: 746414643-3733052814
                                                                                                                    • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                                                    • Instruction ID: cf07203b98d1c4e2a5a243276e923f97743910348162c124daff62b8c2796cd6
                                                                                                                    • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                                                    • Instruction Fuzzy Hash: 3771C27290C6858AD760BF65A06077DFBA2EB01BC8F448137DA4D47A89EF3CD4A4C752
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID: $*
                                                                                                                    • API String ID: 3215553584-3982473090
                                                                                                                    • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                                                    • Instruction ID: 3ecf8cc0280739324efbca1f9c4a4d6a8ee86d63e3b1cd6e5aea7ddd9d475657
                                                                                                                    • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                                                    • Instruction Fuzzy Hash: 8B51A872C0C6428AE764FF28A46C33C7762EB85B88F941137C54A4B19DEF38D465C666
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$StringType
                                                                                                                    • String ID: $%s
                                                                                                                    • API String ID: 3586891840-3791308623
                                                                                                                    • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                                                    • Instruction ID: 7ba64abbd9c70d917bc641dff5befdf2657340f49e59d081931e7d4cd3a2123a
                                                                                                                    • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                                                    • Instruction Fuzzy Hash: A041BA22F18B8149EB10AF25D8007A9A3A6FB58BE8F840632DE1D477C5FF3DE5418352
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                                                    • String ID: csm
                                                                                                                    • API String ID: 2466640111-1018135373
                                                                                                                    • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                                                    • Instruction ID: ecba308477324cf3d207a8922d0a901e0eec2e6b5bb23a89a91bdba2c320388b
                                                                                                                    • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                                                    • Instruction Fuzzy Hash: 3A515932A1C74687D620FB56B05076EB7A5FB89B90F940136EA8D07B55EF38E460CB12
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                                                    • String ID: U
                                                                                                                    • API String ID: 2456169464-4171548499
                                                                                                                    • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                                                    • Instruction ID: a864f0951001de7d89bdffb9c15fcf9cd8a2190d1d077f111efacb00076ebf7f
                                                                                                                    • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                                                    • Instruction Fuzzy Hash: 6E41C322B1CA8186D720EF25E8043B9A762FB887D4F814132EE4D87788EF7DE541C751
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1429681911-3916222277
                                                                                                                    • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                                                    • Instruction ID: f6324b841f61a99155fecc6badb89e4f61fb158daf2e03fd3c029f03429e07f6
                                                                                                                    • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                                                    • Instruction Fuzzy Hash: 6C311C3561874186EA18AF12BC1872EB761F78DFD5F908436ED4A43B94DE3CD459CB10
                                                                                                                    APIs
                                                                                                                    • InitializeCriticalSection.KERNEL32(?,?,?,00007FF7ED6C317F,?,?,00001000,00007FF7ED6AE51D), ref: 00007FF7ED6BE8BB
                                                                                                                    • CreateSemaphoreW.KERNEL32(?,?,?,00007FF7ED6C317F,?,?,00001000,00007FF7ED6AE51D), ref: 00007FF7ED6BE8CB
                                                                                                                    • CreateEventW.KERNEL32(?,?,?,00007FF7ED6C317F,?,?,00001000,00007FF7ED6AE51D), ref: 00007FF7ED6BE8E4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                                                    • String ID: Thread pool initialization failed.
                                                                                                                    • API String ID: 3340455307-2182114853
                                                                                                                    • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                                                    • Instruction ID: 2449dfa4fcf69eb8725219ed961c89c76240f55488d3f1c2f65ccb7e23203a1d
                                                                                                                    • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                                                    • Instruction Fuzzy Hash: BE21D832E1DA4286F710AF24D4543AD7393EB98B4CF588036CA0D4B295EF7E9455C7A1
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CapsDeviceRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 127614599-3916222277
                                                                                                                    • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                                                    • Instruction ID: b0e4cd00f22b66eedcba7bc693a77100fa31319fd8560c59271682eaf4a8e2e3
                                                                                                                    • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                                                    • Instruction Fuzzy Hash: 27E0C220B0CA4182FB0C67B6B98923EA261AB4CBD4F958036DA1F837D4EE3CC4E44310
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1137671866-0
                                                                                                                    • Opcode ID: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                                                                                    • Instruction ID: a4dafe93b829ac9bad4cc50e0b3efa802f5bfe3b2b5e99975904f734981ab500
                                                                                                                    • Opcode Fuzzy Hash: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                                                                                    • Instruction Fuzzy Hash: 47A17162E1CA8291EA10EB65E4503ADA362FF857C4F805132EA9D07AE9FF3CE544C711
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1452528299-0
                                                                                                                    • Opcode ID: e740716fb16c43b695f5f219d8f3a9084bf63b213528ce6e7a445183d4fb0460
                                                                                                                    • Instruction ID: 4faa4c0fc754f60bf1f45a9bfa6406431f77af237a31e053138d571db730457e
                                                                                                                    • Opcode Fuzzy Hash: e740716fb16c43b695f5f219d8f3a9084bf63b213528ce6e7a445183d4fb0460
                                                                                                                    • Instruction Fuzzy Hash: 2D517E62F58A4295EB00BF65D4553ACA322EB88BD8F904133DA5C577DAFE3CD244C362
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1077098981-0
                                                                                                                    • Opcode ID: decc2da6846149065e747433b686ffe20880dedc2611ac47de6390cb5f5191d4
                                                                                                                    • Instruction ID: 2e8154627ad08a895ae76b21a682476d6923455318bce9e44e26aee41cc4d8b5
                                                                                                                    • Opcode Fuzzy Hash: decc2da6846149065e747433b686ffe20880dedc2611ac47de6390cb5f5191d4
                                                                                                                    • Instruction Fuzzy Hash: 76515E32A1CB8286E750AF21E8443AEB765FB88BC4F905037EA4D57A58EF3CD514CB51
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4141327611-0
                                                                                                                    • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                                                    • Instruction ID: 413298e1f535ddae9d61cc843e02cc5f49f2497f09c9766096a61b584338a8ea
                                                                                                                    • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                                                    • Instruction Fuzzy Hash: 7341D272E0C78246FB21BB11B060379E296EF80BD4F949132DA4D47AD5EF7CD8518B22
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3823481717-0
                                                                                                                    • Opcode ID: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                                                                                    • Instruction ID: 268ef5925edaa34a7c20ed97b915550ef51683ccb57b69593e6d7b7c952f176c
                                                                                                                    • Opcode Fuzzy Hash: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                                                                                    • Instruction Fuzzy Hash: B041B262F18B5184FB00EF79E8452AC6372BF48BD4B905232DE5D2BAA9EF78D145C311
                                                                                                                    APIs
                                                                                                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7ED6DC45B), ref: 00007FF7ED6E0B91
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7ED6DC45B), ref: 00007FF7ED6E0BF3
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7ED6DC45B), ref: 00007FF7ED6E0C2D
                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7ED6DC45B), ref: 00007FF7ED6E0C57
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1557788787-0
                                                                                                                    • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                                                    • Instruction ID: 08e366888656e6b59db1dcea2d6d41fc0439807d03a0d675e20e69ffb4221a7a
                                                                                                                    • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                                                    • Instruction Fuzzy Hash: 1B21C421E1CB5181DB20AF116440229E3A6FB9CFD0B884136DE8DA7BD4EF3DD5529311
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1447195878-0
                                                                                                                    • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                                                    • Instruction ID: ca591df926d06b7f6e04b7bfe7efc2688ee14979175f8e59a93e50b61c1c52d7
                                                                                                                    • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                                                    • Instruction Fuzzy Hash: 7301C010F0D74342FA187B25B52537892535F847D4F84143AD81E077D6FE3CB8248A32
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CapsDevice$Release
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1035833867-0
                                                                                                                    • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                                                    • Instruction ID: 3c2e9c8be89ac945140fde4f9c2efc361cafd07c9569e267c57d5cb9e35235e6
                                                                                                                    • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                                                    • Instruction Fuzzy Hash: 66E07D60E0DA0682FF5C7B756C5923AA291AF4C789F98C43BD81E473D0FD3CA5A58621
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                                                    • String ID: DXGIDebug.dll
                                                                                                                    • API String ID: 3668304517-540382549
                                                                                                                    • Opcode ID: 0ad4200ea2e17e03f5faeaa6ee63d869aa1a242b7c6a49e8d582d697c98f1931
                                                                                                                    • Instruction ID: 0d30f3b2c807745b64599f07685ef68f59b49f7ce42e6dbb97a7fa6e506a8be2
                                                                                                                    • Opcode Fuzzy Hash: 0ad4200ea2e17e03f5faeaa6ee63d869aa1a242b7c6a49e8d582d697c98f1931
                                                                                                                    • Instruction Fuzzy Hash: 16719D72A18B8186EB14EF25E5403ADB3AAFB547D4F844226DBAD07B95EF7CD061C310
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                                                    • String ID: e+000$gfff
                                                                                                                    • API String ID: 3215553584-3030954782
                                                                                                                    • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                                                    • Instruction ID: e892eeb3cd007ac43f5072113c2311ddb81d78fa146b44dd86c3a5f1644c6358
                                                                                                                    • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                                                    • Instruction Fuzzy Hash: 5D510962F1C7C146E725AB35A85036DBA92A781BD0F889232C69C87BDADF3CD454C712
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                                                    • String ID: SIZE
                                                                                                                    • API String ID: 449872665-3243624926
                                                                                                                    • Opcode ID: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                                                                                    • Instruction ID: 9e5f47542f9ba76cb708f6e4a81c6097e3eddc325940cc39aa10d77dccc404a1
                                                                                                                    • Opcode Fuzzy Hash: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                                                                                    • Instruction Fuzzy Hash: D5418063E2C64285EA10EB15E4413B9A362AF957D4F904233EA9D076D6FE3CD940C722
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                                                    • String ID: C:\Users\user\Desktop\442.docx.exe
                                                                                                                    • API String ID: 3307058713-4147804102
                                                                                                                    • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                                                    • Instruction ID: b181654ccaecdb08d8f84119de0134ef184e3949ab7cd0c3f0b2af7fa72c618c
                                                                                                                    • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                                                    • Instruction Fuzzy Hash: 96419232E0CA5686EB14BF21B8602B8A795EB487D4F864033E94D47785EF3EE4618761
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemText$DialogWindow
                                                                                                                    • String ID: ASKNEXTVOL
                                                                                                                    • API String ID: 445417207-3402441367
                                                                                                                    • Opcode ID: 75a4ef6a6cdb84fc8c98b7401f85638b76a9530d4b428818baa7d4c6ec3066de
                                                                                                                    • Instruction ID: 8198871275f0f3706da2b500b238eac0ed2859f8484da6d2281da7e95da3672c
                                                                                                                    • Opcode Fuzzy Hash: 75a4ef6a6cdb84fc8c98b7401f85638b76a9530d4b428818baa7d4c6ec3066de
                                                                                                                    • Instruction Fuzzy Hash: 0E41B821E0C68281FB10BB11E9543B9A3A2AF89BC5F940037DE4D077D5EF3CE4558362
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide_snwprintf
                                                                                                                    • String ID: $%s$@%s
                                                                                                                    • API String ID: 2650857296-834177443
                                                                                                                    • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                                                    • Instruction ID: b021fe658561eca9aa3f6f2fa68dfcdfff1f2d8cfa3c056ed1854310f766f866
                                                                                                                    • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                                                    • Instruction Fuzzy Hash: BA319C72F1CA4685EA10EF66A4407E9A3A2EB587C4F901033EE0D07795FE3DE915C751
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileHandleType
                                                                                                                    • String ID: @
                                                                                                                    • API String ID: 3000768030-2766056989
                                                                                                                    • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                                                    • Instruction ID: 52cfefb09ec0c5046803780ae5e1cae0ab59a9087401edd1a5b5a1823f3c4c08
                                                                                                                    • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                                                    • Instruction Fuzzy Hash: 1321BB22E0CB4241EB647B24A5A023CA652EB857B4F541337D6AF077D5EE39E491C332
                                                                                                                    APIs
                                                                                                                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7ED6D1D3E), ref: 00007FF7ED6D40BC
                                                                                                                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7ED6D1D3E), ref: 00007FF7ED6D4102
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFileHeaderRaise
                                                                                                                    • String ID: csm
                                                                                                                    • API String ID: 2573137834-1018135373
                                                                                                                    • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                                                    • Instruction ID: 93adbd35d4efd052c539bab14cb43059c9206bbce2c964c0d313df01bb61d98a
                                                                                                                    • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                                                    • Instruction Fuzzy Hash: 75112B32A18B4182EB209B15F440269B7A2FB88B94F584232DE8D07B54EF3DD965C701
                                                                                                                    APIs
                                                                                                                    • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF7ED6BE95F,?,?,?,00007FF7ED6B463A,?,?,?), ref: 00007FF7ED6BEA63
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7ED6BE95F,?,?,?,00007FF7ED6B463A,?,?,?), ref: 00007FF7ED6BEA6E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastObjectSingleWait
                                                                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                                                    • API String ID: 1211598281-2248577382
                                                                                                                    • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                                                    • Instruction ID: 38b3e9c2bc781ccf778978183a97a42e5e7a15d8493bd0c3aabe9c55627400c4
                                                                                                                    • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                                                    • Instruction Fuzzy Hash: 29E01A65E1D84281F600B725AC426B8B2127FA87F4FD01333D43E835E1BE7DAA458322
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.1731516402.00007FF7ED6A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7ED6A0000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.1731363037.00007FF7ED6A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731767290.00007FF7ED6E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED6FB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1731922513.00007FF7ED704000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.1732149068.00007FF7ED70E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_7ff7ed6a0000_442.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FindHandleModuleResource
                                                                                                                    • String ID: RTL
                                                                                                                    • API String ID: 3537982541-834975271
                                                                                                                    • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                                                    • Instruction ID: 86d9fe40c9f97898f9f6445530970c4cebf57dfd16ed5bedf27ccddc16b378f8
                                                                                                                    • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                                                    • Instruction Fuzzy Hash: A4D01791F0D60282FF196B65A44937552525F5DB81FC8407ACC0A8B390FE7E9288C762

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:1%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:5.8%
                                                                                                                    Total number of Nodes:1057
                                                                                                                    Total number of Limit Nodes:13
                                                                                                                    execution_graph 6159 5fd23670 6161 5fd2367f 6159->6161 6160 5fd23690 6161->6160 6162 5fd25ba6 6161->6162 6163 5fd25bc7 6161->6163 6164 6003f7e0 4 API calls 6162->6164 6165 6003f7e0 4 API calls 6163->6165 6166 5fd25bbb 6164->6166 6168 6018ef3a 6165->6168 6167 6003f7e0 4 API calls 6167->6168 6168->6167 6911 5fd21bb0 6913 5fd21bbf 6911->6913 6912 5fd21bd0 6913->6912 6914 6003f7e0 4 API calls 6913->6914 6915 6018ee58 6914->6915 6916 5fd23d30 6917 5fd23d68 6916->6917 6919 6018dbf0 6 API calls 6917->6919 6921 5fd23dfd 6917->6921 6918 5fd23f1a memcpy 6918->6921 6920 5fd23dba 6919->6920 6920->6921 6922 5fd23dcc memcpy 6920->6922 6921->6918 6923 5fd23f6c memcpy 6921->6923 6922->6921 6923->6921 6924 5fd21cb0 6925 5fd21cbf 6924->6925 6927 5fd21ce1 6925->6927 6928 5fd259f0 6925->6928 6929 5fd25a65 6928->6929 6930 5fd25a0e 6928->6930 6929->6927 6932 5fd25a23 6930->6932 6933 5fd25aaf 6930->6933 6931 5fd25a50 6934 6003f7e0 4 API calls 6931->6934 6932->6931 6945 5fd3bfe0 6932->6945 6936 6003f7e0 4 API calls 6933->6936 6934->6929 6938 6018ef1a 6936->6938 6937 5fd25a4a 6937->6931 6939 5fd3f8b0 18 API calls 6937->6939 6940 6003f7e0 4 API calls 6938->6940 6939->6931 6941 6018ef2a 6940->6941 6942 6003f7e0 4 API calls 6941->6942 6944 6018ef3a 6942->6944 6943 6003f7e0 4 API calls 6943->6944 6944->6943 6946 5fd3c125 6945->6946 6947 5fd3bff5 6945->6947 6949 5fe1bfc0 10 API calls 6946->6949 6948 5fd3c046 6947->6948 6950 5fd3c00f 6947->6950 6951 5fd3c16c 6947->6951 6948->6937 6952 5fd3c146 6949->6952 6953 5fd3c083 6950->6953 6955 5fd3c0e0 6950->6955 6961 5fd3c02d 6950->6961 6956 5fe1bfc0 10 API calls 6951->6956 6954 5fe1c340 10 API calls 6952->6954 6953->6937 6954->6948 6958 5fe1bfc0 10 API calls 6955->6958 6957 5fd3c18d 6956->6957 6959 5fe1c340 10 API calls 6957->6959 6960 5fd3c101 6958->6960 6959->6948 6962 5fe1c340 10 API calls 6960->6962 6961->6948 6963 5fdd02e0 3 API calls 6961->6963 6964 5fd3c11d 6962->6964 6965 5fd3c095 6963->6965 6964->6937 6965->6948 6966 5fd373d0 28 API calls 6965->6966 6966->6948 6967 5fd224b0 6968 5fd22500 6967->6968 6969 5fd226fb memcpy 6968->6969 6969->6968 6169 5fe85740 6170 5fe85759 6169->6170 6171 5fe857b6 6170->6171 6181 5fe64e60 EnterCriticalSection 6170->6181 6173 5fe85773 6173->6171 6182 5fe64ea0 LeaveCriticalSection 6173->6182 6175 5fe8578a 6175->6171 6183 5fe64e80 EnterCriticalSection 6175->6183 6177 5fe857a9 6184 5fe64ea0 LeaveCriticalSection 6177->6184 6180 5fe8579b 6180->6171 6180->6177 6185 5fe151d0 6180->6185 6181->6173 6182->6175 6183->6180 6184->6171 6186 5fe151e2 6185->6186 6194 5fe151f5 6185->6194 6195 5fe64e80 EnterCriticalSection 6186->6195 6188 5fe151ef 6188->6194 6196 5fe64ea0 LeaveCriticalSection 6188->6196 6190 5fe1521f 6191 5fe1bfc0 10 API calls 6190->6191 6190->6194 6192 5fe15244 6191->6192 6193 5fe1c340 10 API calls 6192->6193 6193->6194 6194->6177 6195->6188 6196->6190 6213 600e9640 6214 600e966a 6213->6214 6215 600e9852 _errno 6213->6215 6216 600e9818 GetCurrentProcess GetProcessTimes 6214->6216 6217 600e9678 GetCurrentThread GetThreadTimes 6214->6217 6218 600e9750 QueryPerformanceFrequency 6214->6218 6219 600e9710 GetSystemTimeAsFileTime 6214->6219 6221 600e96b2 6214->6221 6216->6215 6216->6221 6217->6215 6217->6221 6218->6215 6220 600e9768 QueryPerformanceCounter 6218->6220 6219->6221 6220->6215 6220->6221 6222 600e9702 6221->6222 6223 600e989a 6221->6223 6224 600e9957 _errno 6221->6224 6225 600e9938 6223->6225 6233 600e98a2 6223->6233 6229 600e990b 6224->6229 6227 600e9944 6225->6227 6225->6229 6226 600e9917 6228 600e9be2 _errno 6227->6228 6230 600e9a7a 6227->6230 6244 600e9bb3 6228->6244 6229->6226 6231 600e9a10 _errno 6229->6231 6232 600e9991 FileTimeToSystemTime 6229->6232 6234 600e9a82 GetSystemTimeAsFileTime 6230->6234 6240 600e9aa3 6230->6240 6238 600e99f5 6231->6238 6232->6231 6235 600e99e5 SetSystemTime 6232->6235 6246 600e9a40 6233->6246 6234->6240 6236 600e9a23 _errno 6235->6236 6235->6238 6236->6238 6241 600e9b15 6240->6241 6240->6244 6258 600e8010 6240->6258 6242 600e9ba7 _errno 6241->6242 6243 600e9b21 GetSystemTimeAsFileTime 6241->6243 6241->6244 6242->6244 6245 600e9b5d 6243->6245 6245->6242 6247 600e9a6b 6246->6247 6248 600e9be2 _errno 6246->6248 6247->6248 6249 600e9a7a 6247->6249 6256 600e9bb3 6248->6256 6250 600e9a82 GetSystemTimeAsFileTime 6249->6250 6252 600e9aa3 6249->6252 6250->6252 6251 600e8010 103 API calls 6251->6252 6252->6251 6253 600e9b15 6252->6253 6252->6256 6254 600e9ba7 _errno 6253->6254 6255 600e9b21 GetSystemTimeAsFileTime 6253->6255 6253->6256 6254->6256 6257 600e9b5d 6255->6257 6256->6229 6257->6254 6259 600e6ad0 13 API calls 6258->6259 6260 600e801e TlsGetValue 6259->6260 6261 600e8088 6260->6261 6267 600e8035 6260->6267 6322 600e6b90 6261->6322 6263 600e8039 6276 600e7e30 6263->6276 6264 600e8060 6266 600e7e30 100 API calls 6264->6266 6269 600e8065 Sleep 6266->6269 6267->6263 6267->6264 6268 600e803e 6270 600e8098 Sleep 6268->6270 6271 600e8045 6268->6271 6272 600e7e30 100 API calls 6269->6272 6270->6271 6274 600e7e30 100 API calls 6271->6274 6273 600e807a 6272->6273 6273->6240 6275 600e8056 6274->6275 6275->6240 6277 600e6ad0 13 API calls 6276->6277 6278 600e7e3a TlsGetValue 6277->6278 6279 600e7ea0 6278->6279 6283 600e7e51 6278->6283 6281 600e6b90 39 API calls 6279->6281 6280 600e7e60 6280->6268 6281->6283 6282 600e7e92 6284 6003f7e0 4 API calls 6282->6284 6283->6280 6283->6282 6285 600e7eb1 6283->6285 6286 600e7e9a 6284->6286 6287 600e7ec7 ResetEvent 6285->6287 6288 600e7ed1 6285->6288 6286->6268 6287->6288 6289 6003f7e0 4 API calls 6288->6289 6290 600e7ed9 6289->6290 6338 600e7d40 6290->6338 6323 600e6850 9 API calls 6322->6323 6326 600e6b9c 6323->6326 6324 600e6ba6 GetCurrentThreadId CreateEventA 6324->6326 6325 600e6ca3 6325->6267 6326->6324 6326->6325 6327 600e6bfc GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 6326->6327 6333 600e6cad 6326->6333 6328 6019242a abort GetModuleHandleA 6327->6328 6329 600e6c60 GetThreadPriority TlsSetValue 6327->6329 6331 601924a9 6328->6331 6332 60192479 GetProcAddress GetProcAddress 6328->6332 6329->6325 6329->6328 6330 600e66e0 8 API calls 6330->6333 6331->6267 6332->6331 6333->6330 6334 600e6ad0 13 API calls 6333->6334 6335 600e6cc8 TlsGetValue 6334->6335 6336 600e6cdd 6335->6336 6337 600e6ce8 6335->6337 6336->6267 6337->6322 6337->6328 6339 600e7d49 6338->6339 6401 600e7cf0 6339->6401 6342 600e7cf0 40 API calls 6343 600e7d93 6342->6343 6407 600e7bb0 6343->6407 6402 600e6ad0 13 API calls 6401->6402 6403 600e7cf8 TlsGetValue 6402->6403 6404 600e7d30 6403->6404 6406 600e7d0d 6403->6406 6405 600e6b90 39 API calls 6404->6405 6405->6406 6406->6342 6408 600e7bbe 6407->6408 6409 600e7bd2 6408->6409 6422 600e6cf0 6408->6422 6411 600e7bec TlsGetValue 6409->6411 6412 600e7bd8 longjmp 6409->6412 6413 600e7c2d _endthreadex 6411->6413 6414 600e7c01 6411->6414 6412->6411 6417 600e7c36 CloseHandle 6413->6417 6415 600e7c6d 6414->6415 6416 600e7c0a 6414->6416 6418 600e7c77 CloseHandle 6415->6418 6420 600e7c22 6415->6420 6419 600e7c18 CloseHandle 6416->6419 6416->6420 6417->6420 6418->6420 6419->6420 6420->6413 6420->6417 6421 600e7c55 TlsSetValue 6420->6421 6421->6413 6423 600e6e10 6422->6423 6424 600e6cf8 6422->6424 6423->6409 6425 6003f7e0 4 API calls 6424->6425 6426 600e6d22 6425->6426 6427 600e6df1 6426->6427 6430 600ea1f0 6426->6430 6437 600ea500 6426->6437 6427->6409 6446 600ea010 6430->6446 6432 600ea206 6432->6426 6433 600ea202 6433->6432 6434 6003f7e0 4 API calls 6433->6434 6435 600ea237 6433->6435 6434->6435 6436 6003f7e0 malloc free SetEvent GetCurrentThreadId 6435->6436 6436->6435 6439 600ea511 6437->6439 6438 600ea580 6438->6426 6439->6438 6440 6003f7e0 4 API calls 6439->6440 6445 600ea53b 6439->6445 6441 600ea531 6440->6441 6442 6003f7e0 4 API calls 6441->6442 6442->6445 6443 6003f7e0 malloc free SetEvent GetCurrentThreadId 6443->6445 6445->6443 6484 600e5b50 6445->6484 6447 600ea060 6446->6447 6449 600ea01e 6446->6449 6450 600e9fb0 6447->6450 6449->6433 6451 600e9fc2 6450->6451 6453 600e9ff0 6451->6453 6455 600e9e70 6451->6455 6453->6449 6454 600e9fd7 6454->6449 6456 600e9f68 6455->6456 6457 600e9e83 calloc 6455->6457 6456->6454 6458 600e9ea7 6457->6458 6459 600e9f09 6457->6459 6460 600e9ed9 6458->6460 6461 600e9f20 free 6458->6461 6459->6454 6462 600e9f40 6460->6462 6463 600e9ef0 6460->6463 6461->6454 6465 6003f980 2 API calls 6462->6465 6472 600e54a0 6463->6472 6467 600e9f4c free 6465->6467 6466 600e9f03 6466->6459 6468 6003f980 2 API calls 6466->6468 6467->6454 6469 600e9f8c 6468->6469 6470 6003f980 2 API calls 6469->6470 6471 600e9f94 free 6470->6471 6471->6459 6473 600e55f0 6472->6473 6474 600e54c1 6472->6474 6473->6466 6475 600e54ce calloc 6474->6475 6476 600e5598 6474->6476 6475->6476 6477 600e54ec CreateSemaphoreA CreateSemaphoreA 6475->6477 6476->6466 6478 600e55b7 6477->6478 6479 600e5555 6477->6479 6482 600e55bb CloseHandle 6478->6482 6483 600e55c7 free 6478->6483 6480 600e55a8 CloseHandle 6479->6480 6481 600e5559 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 6479->6481 6480->6478 6481->6476 6482->6483 6483->6466 6485 600e5b61 6484->6485 6486 600e5b81 6484->6486 6485->6486 6487 600e5b90 EnterCriticalSection 6485->6487 6486->6445 6490 600e5ba6 6487->6490 6494 600e5bd9 6487->6494 6488 600e5c1d LeaveCriticalSection 6489 600e5c50 LeaveCriticalSection 6488->6489 6489->6486 6490->6489 6495 600e5900 EnterCriticalSection LeaveCriticalSection 6490->6495 6492 600e5bd1 6493 600e5c68 LeaveCriticalSection 6492->6493 6492->6494 6493->6486 6494->6488 6494->6489 6496 600e5958 6495->6496 6497 600e5945 6495->6497 6502 600e5620 6496->6502 6497->6492 6499 600e5974 EnterCriticalSection 6500 600e5998 6499->6500 6501 600e5982 LeaveCriticalSection 6499->6501 6500->6501 6501->6492 6503 600e5645 6502->6503 6507 600e5850 6502->6507 6543 600e7ac0 6503->6543 6506 600e5898 WaitForSingleObject 6511 600e5700 6506->6511 6507->6506 6507->6511 6508 600e5710 6512 600e5760 6508->6512 6514 600e571a 6508->6514 6509 600e57b9 6509->6499 6511->6509 6516 600e5900 EnterCriticalSection LeaveCriticalSection 6511->6516 6513 600e5820 6512->6513 6517 600e578f 6512->6517 6524 600e7c90 40 API calls 6512->6524 6530 600e579c 6512->6530 6515 600e7c90 40 API calls 6513->6515 6514->6511 6519 600e5743 6514->6519 6527 600e57f8 WaitForSingleObject 6514->6527 6536 600e7c90 40 API calls 6514->6536 6520 600e5825 6515->6520 6525 600e5958 6516->6525 6526 600e5945 6516->6526 6517->6511 6533 600e7c90 40 API calls 6517->6533 6518 600e56c0 6518->6507 6522 600e56d0 WaitForSingleObject 6518->6522 6519->6511 6521 600e5752 6519->6521 6523 600e7c90 40 API calls 6519->6523 6529 600e582d WaitForSingleObject 6520->6529 6520->6530 6521->6511 6531 600e7e30 91 API calls 6521->6531 6522->6511 6535 600e56f0 6522->6535 6523->6521 6524->6512 6532 600e5620 91 API calls 6525->6532 6526->6499 6527->6511 6527->6521 6528 600e565a 6528->6507 6528->6511 6528->6518 6528->6521 6534 600e5698 ResetEvent 6528->6534 6540 600e7e30 91 API calls 6528->6540 6549 6003fe90 6528->6549 6529->6511 6530->6511 6541 600e7e30 91 API calls 6530->6541 6531->6511 6537 600e5974 EnterCriticalSection 6532->6537 6533->6530 6534->6528 6534->6530 6535->6511 6557 600e7c90 6535->6557 6536->6514 6538 600e5998 6537->6538 6539 600e5982 LeaveCriticalSection 6537->6539 6538->6539 6539->6499 6540->6528 6541->6511 6544 600e6ad0 13 API calls 6543->6544 6545 600e7ac8 TlsGetValue 6544->6545 6546 600e564e 6545->6546 6547 600e7ae8 6545->6547 6546->6508 6546->6528 6548 600e6b90 39 API calls 6547->6548 6548->6546 6550 6003ff60 WaitForMultipleObjects 6549->6550 6551 6003fec6 6549->6551 6553 6003ff2d 6550->6553 6552 6003fb30 QueryPerformanceCounter GetTickCount QueryPerformanceFrequency GetSystemTimeAsFileTime 6551->6552 6555 6003fecf 6551->6555 6552->6555 6553->6528 6554 6003feec WaitForMultipleObjects 6554->6553 6554->6555 6555->6553 6555->6554 6556 6003fb30 QueryPerformanceCounter GetTickCount QueryPerformanceFrequency GetSystemTimeAsFileTime 6555->6556 6556->6555 6558 600e7c99 6557->6558 6559 600e7ca0 6557->6559 6558->6511 6560 600e6ad0 13 API calls 6559->6560 6561 600e7ca8 TlsGetValue 6560->6561 6562 600e7ce0 6561->6562 6564 600e7cbd 6561->6564 6563 600e6b90 39 API calls 6562->6563 6563->6564 6564->6511 5714 5fd245a0 5715 5fd245cf 5714->5715 5727 5fd2473c 5714->5727 5716 5fd24690 5715->5716 5717 5fd245d5 5715->5717 5733 6018dbf0 malloc 5717->5733 5726 6018ed7c 5728 6018ed89 5726->5728 5730 5fd213e0 5 API calls 5726->5730 5727->5726 5741 5fd213e0 5727->5741 5731 6018ed92 5728->5731 5732 5fd213e0 5 API calls 5728->5732 5730->5728 5732->5731 5734 6018dc15 5733->5734 5736 6018f994 fwrite 5734->5736 5738 6018f9e7 5734->5738 5735 6018f9f3 abort free 5735->5738 5737 6018f9bd fputs 5736->5737 5739 6018f9d2 fputc 5737->5739 5738->5735 5740 6018fa35 5738->5740 5739->5738 5744 600e4970 5741->5744 5745 5fd213f7 5744->5745 5746 600e4982 _lock 5744->5746 5745->5726 5747 600e4994 5746->5747 5748 600e49f0 calloc 5746->5748 5750 600e499e _unlock 5747->5750 5751 600e49c0 realloc 5747->5751 5748->5747 5749 600e4a1a _unlock 5748->5749 5749->5745 5750->5745 5751->5749 5752 600e49de 5751->5752 5752->5750 6135 5fd222c0 6136 5fd222e6 6135->6136 6137 5fd22403 memcpy 6136->6137 6138 5fd22447 memcpy 6136->6138 6137->6136 6138->6136 6565 5fd21d00 6566 5fd21d0f 6565->6566 6568 5fd21d31 6566->6568 6569 5fd25ac0 6566->6569 6570 5fd25b35 6569->6570 6571 5fd25ade 6569->6571 6570->6568 6572 5fd25af3 6571->6572 6574 5fd25b7f 6571->6574 6573 5fd25b20 6572->6573 6584 5fd3c8f0 6572->6584 6575 6003f7e0 4 API calls 6573->6575 6577 6003f7e0 4 API calls 6574->6577 6575->6570 6579 6018ef2a 6577->6579 6578 5fd25b1a 6578->6573 6610 5fd3f8b0 6578->6610 6581 6003f7e0 4 API calls 6579->6581 6583 6018ef3a 6581->6583 6582 6003f7e0 4 API calls 6582->6583 6583->6582 6585 5fd3c905 6584->6585 6586 5fd3ca2e 6584->6586 6587 5fd3c95a 6585->6587 6589 5fd3c91c 6585->6589 6593 5fd3cac3 6585->6593 6588 5fe1bfc0 10 API calls 6586->6588 6587->6578 6590 5fd3ca4f 6588->6590 6591 5fd3ca75 6589->6591 6592 5fd3c928 6589->6592 6594 5fe1c340 10 API calls 6590->6594 6598 5fe1bfc0 10 API calls 6591->6598 6595 5fd3c992 6592->6595 6604 5fd3c93d 6592->6604 6596 5fe1bfc0 10 API calls 6593->6596 6594->6587 6600 5fe1bfc0 10 API calls 6595->6600 6597 5fd3cae4 6596->6597 6599 5fe1c340 10 API calls 6597->6599 6601 5fd3ca9d 6598->6601 6599->6587 6602 5fd3c9b7 6600->6602 6603 5fe1c340 10 API calls 6601->6603 6605 5fe1c340 10 API calls 6602->6605 6603->6587 6604->6587 6631 5fdd02e0 6604->6631 6607 5fd3c9d3 6605->6607 6607->6578 6611 5fd3f9a0 6610->6611 6612 5fd3f8c6 6610->6612 6611->6573 6613 5fd3f9e0 6612->6613 6614 5fd3f975 6612->6614 6618 5fd3f8d0 6612->6618 6615 5fd5d160 15 API calls 6613->6615 6623 5fd3f952 6613->6623 6614->6623 6861 5fd5d160 6614->6861 6615->6618 6617 5fd3f904 6622 5fd3f918 6617->6622 6842 5fd5d260 6617->6842 6618->6617 6620 5fd3fa70 6618->6620 6618->6623 6621 5fd5d260 15 API calls 6620->6621 6621->6623 6622->6623 6624 5fd5d260 15 API calls 6622->6624 6626 5fd3f937 6622->6626 6623->6573 6624->6626 6625 5fd3f949 6625->6623 6630 5fd5d260 15 API calls 6625->6630 6626->6623 6627 5fd5d260 15 API calls 6626->6627 6629 5fd3f940 6626->6629 6627->6629 6628 5fd5d260 15 API calls 6628->6625 6629->6623 6629->6625 6629->6628 6630->6623 6632 5fdd02ff 6631->6632 6633 5fd3c9e5 6632->6633 6654 5fe64f80 GetLastError TlsGetValue SetLastError 6632->6654 6633->6587 6635 5fd373d0 6633->6635 6636 5fd374e0 6635->6636 6637 5fd373d8 6635->6637 6636->6587 6643 5fd37449 6637->6643 6644 5fd373fb 6637->6644 6709 5fdd03f0 6637->6709 6640 5fd3742c 6641 5fd37591 6640->6641 6645 5fd37488 6640->6645 6646 5fd37437 6640->6646 6641->6587 6642 5fd374cc 6642->6587 6643->6587 6644->6642 6655 5fdcfc10 6644->6655 6647 5fe1bfc0 10 API calls 6645->6647 6646->6643 6648 5fe1bfc0 10 API calls 6646->6648 6649 5fd374b0 6647->6649 6650 5fd37568 6648->6650 6651 5fe1c340 10 API calls 6649->6651 6652 5fe1c340 10 API calls 6650->6652 6651->6642 6653 5fd37584 6652->6653 6653->6587 6654->6633 6656 5fdcfc37 6655->6656 6696 5fdcfc3b 6656->6696 6712 5fe64f80 GetLastError TlsGetValue SetLastError 6656->6712 6659 5fdd0020 6800 5fe64f80 GetLastError TlsGetValue SetLastError 6659->6800 6660 5fe512f0 10 API calls 6662 5fdcfc5c 6660->6662 6662->6659 6662->6660 6668 5fdd00b0 6662->6668 6670 5fe64f80 GetLastError TlsGetValue SetLastError 6662->6670 6673 5fdcfda0 6662->6673 6674 5fdcfcb1 SwitchToFiber 6662->6674 6681 5fdd010c 6662->6681 6682 5fdcfd3d memcpy 6662->6682 6683 5fdcfec2 CreateFiber 6662->6683 6662->6696 6713 5fe4c050 6662->6713 6719 5fe4c100 6662->6719 6736 5fdcf8f0 6662->6736 6768 5fe514d0 6662->6768 6779 5fe51180 6662->6779 6797 5ff64530 ConvertThreadToFiber 6662->6797 6799 5fe64fc0 TlsSetValue 6662->6799 6663 5fdd003c 6665 5fdd0044 6663->6665 6663->6668 6669 5fe9d400 13 API calls 6665->6669 6672 5fe1bfc0 10 API calls 6668->6672 6669->6696 6670->6662 6676 5fdd00eb 6672->6676 6680 5fe1bfc0 10 API calls 6673->6680 6677 5fe4c050 4 API calls 6674->6677 6679 5fe1c340 10 API calls 6676->6679 6677->6662 6679->6696 6686 5fdcfdc1 6680->6686 6801 5fe64f80 GetLastError TlsGetValue SetLastError 6681->6801 6682->6662 6683->6662 6687 5fdcffd0 6683->6687 6690 5fe1c340 10 API calls 6686->6690 6694 5fdcfff0 DeleteFiber 6687->6694 6688 5fe4c050 4 API calls 6688->6662 6689 5fdd0118 6691 5fdd015c 6689->6691 6692 5fdd011e 6689->6692 6693 5fdcfddd 6690->6693 6699 5fe1bfc0 10 API calls 6691->6699 6698 5fe9d400 13 API calls 6692->6698 6723 5fe64f80 GetLastError TlsGetValue SetLastError 6693->6723 6694->6696 6696->6640 6697 5fdcfdec 6700 5fdcfdf6 6697->6700 6701 5fdcff93 6697->6701 6698->6696 6702 5fdd017d 6699->6702 6724 5fe9d400 6700->6724 6704 5fe1bfc0 10 API calls 6701->6704 6703 5fe1c340 10 API calls 6702->6703 6703->6696 6706 5fdcffb4 6704->6706 6708 5fe1c340 10 API calls 6706->6708 6707 5fdcfe26 6707->6640 6708->6687 6710 5fe514d0 12 API calls 6709->6710 6711 5fdd040f 6710->6711 6711->6644 6712->6662 6715 5fe4c06d 6713->6715 6714 5fe4c086 6716 5fe4c0ae 6714->6716 6803 5fe64fc0 TlsSetValue 6714->6803 6715->6714 6802 5fe64f80 GetLastError TlsGetValue SetLastError 6715->6802 6716->6662 6720 5fdcfd72 SwitchToFiber 6719->6720 6721 5fe4c110 6719->6721 6720->6688 6721->6720 6804 5fe64f80 GetLastError TlsGetValue SetLastError 6721->6804 6723->6697 6725 5fe9d411 6724->6725 6733 5fe9d43a 6724->6733 6726 5fe9d41b 6725->6726 6727 5fe9d484 6725->6727 6805 5fe9c640 6726->6805 6730 5fe1bfc0 10 API calls 6727->6730 6729 5fe9d429 6732 5fe9d453 memmove 6729->6732 6729->6733 6731 5fe9d4a5 6730->6731 6734 5fe1c340 10 API calls 6731->6734 6732->6733 6733->6707 6735 5fe9d4c1 6734->6735 6735->6707 6737 5fdcfa40 6736->6737 6739 5fdcf905 6736->6739 6738 5fe1bfc0 10 API calls 6737->6738 6741 5fdcfa63 6738->6741 6740 5fe51180 19 API calls 6739->6740 6765 5fdcf925 6739->6765 6742 5fdcf94d 6740->6742 6743 5fe1c340 10 API calls 6741->6743 6745 5fe514d0 12 API calls 6742->6745 6742->6765 6744 5fdcfa7f 6743->6744 6744->6662 6746 5fdcf96d 6745->6746 6746->6765 6823 5fe9cb80 6746->6823 6748 5fdcf983 6749 5fdcfbb4 6748->6749 6752 5fdcf98d 6748->6752 6754 5fe1bfc0 10 API calls 6749->6754 6750 5fdcf99a 6836 5fe64fc0 TlsSetValue 6750->6836 6751 5fe514d0 12 API calls 6751->6752 6752->6750 6752->6751 6755 5fdcf9a0 CreateFiber 6752->6755 6759 5fe9d400 13 API calls 6752->6759 6756 5fdcfbd5 6754->6756 6755->6752 6757 5fdcfa90 6755->6757 6758 5fe1c340 10 API calls 6756->6758 6761 5fdcfaab DeleteFiber 6757->6761 6758->6765 6759->6752 6760 5fdcfa23 6762 5fe1bfc0 10 API calls 6760->6762 6760->6765 6761->6750 6763 5fdcfb01 6762->6763 6764 5fe1c340 10 API calls 6763->6764 6767 5fdcfb1d 6764->6767 6765->6662 6766 5fdcfb5b DeleteFiber 6766->6767 6767->6765 6767->6766 6769 5fe51542 6768->6769 6770 5fe514ef 6768->6770 6771 5fe51559 malloc 6769->6771 6778 5fe5150c 6769->6778 6773 5fe51520 6770->6773 6774 5fe51506 6770->6774 6772 5fe51524 memset 6771->6772 6771->6774 6772->6662 6773->6772 6773->6778 6775 5fe1bfc0 10 API calls 6774->6775 6774->6778 6776 5fe51586 6775->6776 6777 5fe1c340 10 API calls 6776->6777 6777->6778 6778->6662 6837 5fe64f80 GetLastError TlsGetValue SetLastError 6779->6837 6781 5fe51192 6782 5fe51198 6781->6782 6784 5fe514d0 12 API calls 6781->6784 6783 5fe512f0 10 API calls 6782->6783 6790 5fe511b4 6783->6790 6785 5fe511ff 6784->6785 6785->6790 6838 5fe64fc0 TlsSetValue 6785->6838 6787 5fe51257 6840 5fe64fc0 TlsSetValue 6787->6840 6789 5fe51215 6789->6787 6789->6790 6839 5fe64e80 EnterCriticalSection 6789->6839 6790->6662 6792 5fe51253 6792->6787 6793 5fe9d400 13 API calls 6792->6793 6794 5fe5129e 6793->6794 6841 5fe64ea0 LeaveCriticalSection 6794->6841 6796 5fe512ab 6796->6782 6796->6787 6798 5ff6454e 6797->6798 6798->6662 6799->6662 6800->6663 6801->6689 6802->6714 6803->6716 6804->6720 6806 5fe9c65e 6805->6806 6807 5fe9c710 6805->6807 6808 5fe9c7c5 6806->6808 6819 5fe9c67b 6806->6819 6812 5fe1bfc0 10 API calls 6807->6812 6810 5fe514d0 12 API calls 6808->6810 6809 5fe9c686 6811 5fe9c6b1 6809->6811 6815 5fe513c0 free 6809->6815 6810->6811 6811->6729 6814 5fe9c731 6812->6814 6813 5fe9c77c 6818 5fe1bfc0 10 API calls 6813->6818 6816 5fe1c340 10 API calls 6814->6816 6815->6811 6817 5fe9c74d 6816->6817 6817->6729 6820 5fe9c79d 6818->6820 6819->6809 6819->6811 6819->6813 6821 5fe1c340 10 API calls 6820->6821 6822 5fe9c7b9 6821->6822 6822->6729 6824 5fe514d0 12 API calls 6823->6824 6825 5fe9cba5 6824->6825 6826 5fe9cc20 6825->6826 6827 5fe9cbc3 6825->6827 6835 5fe9cc03 6825->6835 6832 5fe1bfc0 10 API calls 6826->6832 6828 5fe9cbdb 6827->6828 6829 5fe9cca0 6827->6829 6831 5fe513c0 free 6828->6831 6828->6835 6830 5fe514d0 12 API calls 6829->6830 6830->6835 6831->6835 6833 5fe9cc41 6832->6833 6834 5fe1c340 10 API calls 6833->6834 6834->6835 6835->6748 6836->6760 6837->6781 6838->6789 6839->6792 6840->6790 6841->6796 6843 5fd5d271 6842->6843 6844 5fd5d320 6842->6844 6845 5fd5d305 6843->6845 6846 5fd5d27c 6843->6846 6847 5fd58640 10 API calls 6844->6847 6887 5fea22f0 EnterCriticalSection 6845->6887 6849 5fd5d281 6846->6849 6850 5fd5d2c0 6846->6850 6851 5fd5d2f4 6847->6851 6879 5fea22f0 EnterCriticalSection 6849->6879 6881 5fd58640 6850->6881 6854 5fd5d2f8 6851->6854 6855 6018f741 GetModuleHandleA 6851->6855 6854->6622 6858 6018f7e9 6855->6858 6859 6018f7b9 GetProcAddress GetProcAddress 6855->6859 6856 5fd5d28f 6880 5fea2330 LeaveCriticalSection 6856->6880 6858->6622 6859->6858 6860 5fd5d2b1 6860->6622 6862 5fd5d225 6861->6862 6863 5fd5d173 6861->6863 6866 5fd58640 10 API calls 6862->6866 6864 5fd5d200 6863->6864 6865 5fd5d17e 6863->6865 6890 5fea22f0 EnterCriticalSection 6864->6890 6868 5fd5d1c0 6865->6868 6869 5fd5d183 6865->6869 6873 5fd5d1f4 6866->6873 6870 5fd58640 10 API calls 6868->6870 6888 5fea22f0 EnterCriticalSection 6869->6888 6870->6873 6871 5fd5d191 6889 5fea2330 LeaveCriticalSection 6871->6889 6874 6018f741 GetModuleHandleA 6873->6874 6878 5fd5d1ac 6873->6878 6876 6018f7e9 6874->6876 6877 6018f7b9 GetProcAddress GetProcAddress 6874->6877 6876->6623 6877->6876 6878->6623 6879->6856 6880->6860 6882 5fd58648 6881->6882 6883 5fe1bfc0 10 API calls 6882->6883 6884 5fd58664 6883->6884 6885 5fe1c0e0 10 API calls 6884->6885 6886 5fd58688 6885->6886 6886->6851 6887->6856 6888->6871 6889->6878 6890->6871 6891 5fd21c80 6893 5fd21c8f 6891->6893 6892 5fd21c9d 6893->6892 6894 6003f7e0 4 API calls 6893->6894 6895 6018ef0a 6894->6895 6896 6003f7e0 4 API calls 6895->6896 6897 6018ef1a 6896->6897 6898 6003f7e0 4 API calls 6897->6898 6899 6018ef2a 6898->6899 6900 6003f7e0 4 API calls 6899->6900 6902 6018ef3a 6900->6902 6901 6003f7e0 4 API calls 6901->6902 6902->6901 6970 5fd22aa0 6973 5fd22b7e 6970->6973 6971 5fd23260 6972 5fd23287 memcpy 6971->6972 6974 5fd23380 6972->6974 6973->6971 6973->6974 6975 5fd23221 memcpy 6973->6975 6976 5fd233a1 memcpy 6974->6976 6975->6971 5753 5fe512f0 5754 5fe51332 5753->5754 5757 5fe5130e 5753->5757 5755 5fe51349 malloc 5754->5755 5761 5fe51329 5754->5761 5756 5fe51355 5755->5756 5755->5757 5757->5761 5762 5fe1bfc0 5757->5762 5764 5fe1bfd8 5762->5764 5763 5fe1c043 5772 5fe1c340 5763->5772 5764->5763 5765 5fe1c055 strlen 5764->5765 5767 5fe1c00c 5764->5767 5775 5fe512f0 5765->5775 5767->5763 5770 5fe1c090 strlen 5767->5770 5768 5fe1c078 5768->5767 5769 5fe1c082 strcpy 5768->5769 5769->5767 5771 5fe512f0 7 API calls 5770->5771 5771->5763 5784 5fe1c0e0 5772->5784 5774 5fe1c367 5774->5761 5776 5fe51332 5775->5776 5779 5fe5130e 5775->5779 5777 5fe51349 malloc 5776->5777 5783 5fe51329 5776->5783 5778 5fe51355 5777->5778 5777->5779 5778->5768 5780 5fe1bfc0 9 API calls 5779->5780 5779->5783 5781 5fe51379 5780->5781 5782 5fe1c340 9 API calls 5781->5782 5782->5783 5783->5768 5785 5fe1c0ec 5784->5785 5786 5fe1c137 5785->5786 5787 5fe513c0 free 5785->5787 5794 5fe1c16c 5785->5794 5788 5fe1c271 5786->5788 5789 5fe1c13f 5786->5789 5787->5786 5799 5fdd8a30 5788->5799 5795 5fe513c0 5789->5795 5793 5fe513c0 free 5793->5794 5794->5774 5796 5fe513e1 5795->5796 5797 5fe51440 free 5796->5797 5798 5fe513f8 5796->5798 5797->5798 5798->5794 5802 5fdd7c60 5799->5802 5809 5fdd7cad 5802->5809 5803 5fdd7cbc 5810 5fdd6700 5803->5810 5805 5fdd6700 10 API calls 5805->5809 5806 5fdd7cde 5806->5793 5809->5803 5809->5805 5809->5806 5819 5fdd7610 5809->5819 5838 5fdd6850 5809->5838 5811 5fdd6713 5810->5811 5812 5fdd6723 5811->5812 5813 5fdd679e 5811->5813 5814 5fdd67d1 5811->5814 5812->5806 5815 5fe513c0 free 5813->5815 5816 5fe512f0 9 API calls 5814->5816 5815->5812 5817 5fdd67e9 5816->5817 5817->5812 5818 5fdd680b memcpy 5817->5818 5818->5812 5820 5fdd77d1 5819->5820 5822 5fdd765b 5819->5822 5821 5fe512f0 7 API calls 5820->5821 5823 5fdd7a31 memcpy 5820->5823 5825 5fdd788e 5820->5825 5826 5fdd6700 7 API calls 5820->5826 5829 5fe513c0 free 5820->5829 5831 5fdd7a73 5820->5831 5832 5fdd786d 5820->5832 5821->5820 5824 5fdd7767 strlen 5822->5824 5823->5820 5824->5820 5827 5fdd6700 7 API calls 5825->5827 5830 5fdd78d1 5825->5830 5825->5832 5826->5820 5827->5825 5828 5fdd6700 7 API calls 5828->5830 5829->5820 5830->5828 5830->5832 5836 5fdd7bf5 5830->5836 5831->5832 5833 5fe513c0 free 5831->5833 5835 5fe512f0 7 API calls 5831->5835 5837 5fdd7b9e memcpy 5831->5837 5832->5809 5833->5831 5834 5fdd6700 7 API calls 5834->5836 5835->5831 5836->5832 5836->5834 5837->5831 5860 5fdd6892 5838->5860 5839 5fdd6ddf 5841 5fdd6700 9 API calls 5839->5841 5840 5fdd72e0 5843 5fdd6700 9 API calls 5840->5843 5847 5fdd7389 5840->5847 5842 5fdd6e06 5841->5842 5842->5809 5851 5fdd7337 5843->5851 5844 5fdd7474 5846 5fdd6700 9 API calls 5844->5846 5854 5fdd74ab 5844->5854 5845 5fdd6700 9 API calls 5845->5847 5848 5fdd7552 5846->5848 5847->5844 5847->5845 5849 5fdd6d2f 5847->5849 5848->5849 5852 5fdd75d7 5848->5852 5853 5fdd7562 5848->5853 5849->5809 5850 5fdd6700 9 API calls 5850->5854 5851->5847 5851->5849 5855 5fdd6700 9 API calls 5851->5855 5856 5fdd6700 9 API calls 5852->5856 5857 5fdd6700 9 API calls 5853->5857 5854->5849 5854->5850 5855->5851 5858 5fdd7583 5856->5858 5857->5858 5858->5849 5858->5854 5859 5fdd6700 9 API calls 5858->5859 5859->5858 5860->5839 5860->5840 5860->5844 5860->5849 5864 5fdd6ca1 5860->5864 5861 5fdd6ce0 5863 5fdd6700 9 API calls 5861->5863 5867 5fdd6cf0 5861->5867 5862 5fdd6fab 5862->5861 5865 5fdd6fb3 5862->5865 5863->5867 5864->5861 5864->5862 5864->5865 5871 5fdd6ffe 5864->5871 5868 5fdd6700 9 API calls 5865->5868 5870 5fdd6fbf 5865->5870 5866 5fdd6700 9 API calls 5866->5867 5867->5840 5867->5849 5867->5866 5868->5870 5869 5fdd6700 9 API calls 5869->5870 5870->5849 5870->5867 5870->5869 5871->5849 5871->5861 5872 5fe513c0 free 5871->5872 5873 5fe512f0 9 API calls 5871->5873 5874 5fdd712e memcpy 5871->5874 5872->5871 5873->5871 5874->5871 6139 6016a400 6140 6016a413 6139->6140 6155 6016a4d0 6139->6155 6141 6016a427 6140->6141 6142 6016a500 6140->6142 6144 6016a55a 6141->6144 6146 6016a452 6141->6146 6147 6016a540 6141->6147 6143 6016a520 memset 6142->6143 6145 6016a50d 6142->6145 6143->6145 6149 6016a598 memset 6144->6149 6152 6016a572 6144->6152 6148 6018dbf0 6 API calls 6146->6148 6150 6018dbf0 6 API calls 6147->6150 6151 6016a46b 6148->6151 6149->6152 6150->6144 6153 6016a4ab memmove 6151->6153 6154 6016a480 memset 6151->6154 6152->6153 6152->6155 6153->6155 6154->6153 6200 5fe7b650 6203 5fe79fc0 6200->6203 6202 5fe7b687 6205 5fe7a010 6203->6205 6204 5fe7a03d 6204->6202 6205->6204 6206 5fe1bfc0 10 API calls 6205->6206 6207 5fe7a091 6206->6207 6208 5fe1c340 10 API calls 6207->6208 6208->6204 6977 5fe72210 6978 5fe7221b 6977->6978 6980 5fe72239 6977->6980 6978->6980 6981 5fe71d20 6978->6981 6982 5fe71d54 6981->6982 6983 5fe71dc0 6982->6983 7001 5fe64e60 EnterCriticalSection 6982->7001 6985 5fe1bfc0 10 API calls 6983->6985 6987 5fe71de1 6985->6987 6986 5fe71d82 6986->6983 6988 5fe71d86 6986->6988 6989 5fe1c340 10 API calls 6987->6989 6990 5fe71e04 6988->6990 6991 5fe71d8f 6988->6991 6992 5fe71dfd 6989->6992 7003 5fe64ea0 LeaveCriticalSection 6990->7003 7002 5fe64ea0 LeaveCriticalSection 6991->7002 6992->6980 6994 5fe71dae 6996 5fe1bfc0 10 API calls 6994->6996 6997 5fe71db2 6994->6997 6998 5fe71e32 6996->6998 6997->6980 6999 5fe1c340 10 API calls 6998->6999 7000 5fe71e4e 6999->7000 7000->6980 7001->6986 7002->6994 7003->6994 5875 6018e260 5877 6018e286 5875->5877 5879 6018e2d2 5875->5879 5876 6018e348 5877->5879 5924 60137c80 5877->5924 5879->5876 5883 6018e53a 5879->5883 5896 6018e487 5879->5896 5900 6018e4e0 5879->5900 5880 6018e4a0 5884 6018e7d6 5880->5884 5904 6018e4b0 5880->5904 5881 6018e50d 5936 600ebac0 5883->5936 5887 600ebac0 31 API calls 5884->5887 5890 6018e7e9 5887->5890 5889 6018e4cc 5892 600d8ba0 7 API calls 5889->5892 5893 600ebc80 31 API calls 5890->5893 5892->5900 5894 6018e7f7 5893->5894 5895 600ebc80 31 API calls 5894->5895 5897 6018e800 5895->5897 5896->5880 5908 6018e55b 5896->5908 5910 6018e680 5896->5910 5897->5904 5898 6018e9dc 5898->5900 5901 6018f844 abort 5898->5901 5899 600ebd40 31 API calls 5899->5908 5900->5881 5912 6018f871 5900->5912 5901->5900 5903 600ebc80 31 API calls 5903->5908 5904->5900 5928 600d8ba0 5904->5928 5906 6018e946 5906->5910 5980 600ebd40 5906->5980 6004 600eba50 5906->6004 6010 600ebb90 5906->6010 5908->5896 5908->5899 5908->5903 5965 6018dd60 5908->5965 5909 600ebac0 31 API calls 5909->5912 5910->5880 5910->5898 5910->5900 5910->5904 5910->5906 5911 600ebb90 31 API calls 5911->5912 5912->5909 5912->5911 5913 6018f907 5912->5913 5914 6018f92f abort 5913->5914 5915 6018dce0 5914->5915 5916 6018f93d abort 5915->5916 5917 6018f944 5916->5917 5919 6018f994 fwrite 5917->5919 5921 6018f9e7 5917->5921 5918 6018f9f3 abort free 5918->5921 5920 6018f9bd fputs 5919->5920 5922 6018f9d2 fputc 5920->5922 5921->5918 5923 6018fa35 5921->5923 5922->5921 5925 60137c90 5924->5925 5926 60137cb8 5924->5926 5925->5926 5927 60137c9a strcmp 5925->5927 5926->5879 5927->5926 5929 600d8bb9 5928->5929 5930 60192382 6 API calls 5928->5930 5929->5930 5933 600d8be0 5929->5933 5934 600d8bd9 5929->5934 5931 601923e9 5930->5931 5932 601923ea rand_s 5930->5932 5931->5889 5935 601923fe 5932->5935 5933->5889 5934->5889 5935->5889 5937 600ebad3 5936->5937 5938 600ebc80 31 API calls 5937->5938 5941 600ebae8 5937->5941 5939 600ebb6c 5938->5939 5940 600ebd40 31 API calls 5939->5940 5940->5941 5942 600ebc80 5941->5942 5943 600ebcb0 5942->5943 5944 600ebc84 5942->5944 5943->5908 5945 6018f818 abort 5944->5945 5947 600ebc94 5944->5947 5946 6018f820 5945->5946 5948 6018f82c abort 5946->5948 5949 6018f831 5946->5949 5947->5908 5948->5949 5950 6018f844 abort 5949->5950 5953 6018f849 5949->5953 5950->5953 5951 600ebac0 21 API calls 5951->5953 5952 600ebb90 21 API calls 5952->5953 5953->5951 5953->5952 5954 6018f907 5953->5954 5955 6018f92f abort 5954->5955 5956 6018dce0 5955->5956 5957 6018f93d abort 5956->5957 5958 6018f944 5957->5958 5960 6018f994 fwrite 5958->5960 5962 6018f9e7 5958->5962 5959 6018f9f3 abort free 5959->5962 5961 6018f9bd fputs 5960->5961 5963 6018f9d2 fputc 5961->5963 5962->5959 5964 6018fa35 5962->5964 5963->5962 5968 6018dd6e 5965->5968 5966 600ebac0 31 API calls 5966->5968 5967 600ebb90 31 API calls 5967->5968 5968->5966 5968->5967 5969 6018f907 5968->5969 5970 6018f92f abort 5969->5970 5971 6018dce0 5970->5971 5972 6018f93d abort 5971->5972 5973 6018f944 5972->5973 5974 6018f9e7 5973->5974 5976 6018f994 fwrite 5973->5976 5975 6018f9f3 abort free 5974->5975 5979 6018fa35 5974->5979 5975->5974 5977 6018f9bd fputs 5976->5977 5978 6018f9d2 fputc 5977->5978 5978->5974 5981 600ebd4d 5980->5981 5982 600ebda0 5980->5982 5983 6018f810 abort 5981->5983 5987 600ebd5a 5981->5987 5982->5906 5984 6018f818 abort 5983->5984 5985 6018f820 5984->5985 5986 6018f82c abort 5985->5986 5988 6018f831 5985->5988 5986->5988 5987->5906 5989 6018f844 abort 5988->5989 5992 6018f849 5988->5992 5989->5992 5990 600ebac0 20 API calls 5990->5992 5991 600ebb90 20 API calls 5991->5992 5992->5990 5992->5991 5993 6018f907 5992->5993 5994 6018f92f abort 5993->5994 5995 6018dce0 5994->5995 5996 6018f93d abort 5995->5996 5997 6018f944 5996->5997 5999 6018f994 fwrite 5997->5999 6000 6018f9e7 5997->6000 5998 6018f9f3 abort free 5998->6000 6001 6018f9bd fputs 5999->6001 6000->5998 6003 6018fa35 6000->6003 6002 6018f9d2 fputc 6001->6002 6002->6000 6005 600eba72 6004->6005 6006 600ebc80 31 API calls 6005->6006 6009 600ebab3 6005->6009 6007 600ebb6c 6006->6007 6008 600ebd40 31 API calls 6007->6008 6008->6009 6009->5906 6013 600ebbb8 6010->6013 6011 600ebd40 21 API calls 6011->6013 6012 600ebc68 6015 6018f82c abort 6012->6015 6017 6018f831 6012->6017 6013->6011 6013->6012 6014 600eba50 21 API calls 6013->6014 6016 600ebc2a 6013->6016 6014->6013 6015->6017 6018 6018f818 abort 6016->6018 6020 600ebc36 6016->6020 6019 6018f844 abort 6017->6019 6023 6018f849 6017->6023 6018->6012 6019->6023 6020->5906 6021 600ebac0 21 API calls 6021->6023 6022 600ebb90 21 API calls 6022->6023 6023->6021 6023->6022 6024 6018f907 6023->6024 6025 6018f92f abort 6024->6025 6026 6018dce0 6025->6026 6027 6018f93d abort 6026->6027 6028 6018f944 6027->6028 6030 6018f994 fwrite 6028->6030 6032 6018f9e7 6028->6032 6029 6018f9f3 abort free 6029->6032 6031 6018f9bd fputs 6030->6031 6033 6018f9d2 fputc 6031->6033 6032->6029 6034 6018fa35 6032->6034 6033->6032 6209 60182320 6210 601823b2 6209->6210 6212 60182330 6209->6212 6211 6018dbf0 6 API calls 6210->6211 6211->6212 6212->6212 6035 600e6b90 6051 600e6850 6035->6051 6037 600e6ba6 GetCurrentThreadId CreateEventA 6039 600e6b9c 6037->6039 6038 600e6ca3 6039->6037 6039->6038 6040 600e6bfc GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 6039->6040 6046 600e6cad 6039->6046 6041 6019242a abort GetModuleHandleA 6040->6041 6042 600e6c60 GetThreadPriority TlsSetValue 6040->6042 6044 601924a9 6041->6044 6045 60192479 GetProcAddress GetProcAddress 6041->6045 6042->6038 6042->6041 6045->6044 6063 600e66e0 GetCurrentThreadId 6046->6063 6074 600e6ad0 6046->6074 6048 600e6cc8 TlsGetValue 6049 600e6cdd 6048->6049 6050 600e6ce8 6048->6050 6050->6035 6050->6041 6052 600e6861 6051->6052 6053 600e686b 6052->6053 6054 600e68b8 calloc 6052->6054 6089 600e6570 6053->6089 6055 600e6872 6054->6055 6056 600e68d2 6054->6056 6097 6003f7e0 6055->6097 6059 600e6570 3 API calls 6056->6059 6061 600e68d7 6059->6061 6061->6055 6062 600e68f8 free 6061->6062 6062->6055 6109 600ea980 6063->6109 6066 600e6773 6067 600e67f0 fprintf 6066->6067 6068 600e67a1 6066->6068 6069 600e67a7 6067->6069 6068->6069 6112 6003f980 6068->6112 6069->6046 6075 600e6add 6074->6075 6076 600e6b88 6074->6076 6120 600e64c0 6075->6120 6076->6048 6078 600e6aed 6079 600e6b04 TlsAlloc 6078->6079 6080 600e6b18 6078->6080 6079->6080 6081 60192425 abort 6079->6081 6083 6003f7e0 4 API calls 6080->6083 6086 600e6b52 fprintf 6080->6086 6087 600e6b7a 6080->6087 6082 6019242a abort GetModuleHandleA 6081->6082 6084 601924a9 6082->6084 6085 60192479 GetProcAddress GetProcAddress 6082->6085 6083->6080 6084->6048 6085->6084 6088 6003f7e0 4 API calls 6086->6088 6087->6048 6088->6080 6090 600e657f 6089->6090 6091 600e66a8 6089->6091 6092 600e659e malloc 6090->6092 6093 600e6670 realloc 6090->6093 6095 600e65b4 6090->6095 6091->6055 6092->6091 6092->6095 6093->6091 6093->6095 6094 600e6622 6094->6055 6095->6094 6096 600e6642 memmove 6095->6096 6096->6094 6098 6003f810 6097->6098 6100 6003f7f2 6097->6100 6105 6003f440 malloc 6098->6105 6101 6003f7fd 6100->6101 6102 6003f853 GetCurrentThreadId 6100->6102 6103 6003f806 6100->6103 6101->6103 6104 6003f828 SetEvent 6101->6104 6102->6101 6102->6103 6103->6039 6104->6103 6106 6003f45b 6105->6106 6107 6003f49d 6105->6107 6106->6107 6108 6003f493 free 6106->6108 6107->6100 6108->6107 6117 600db640 6109->6117 6113 6003f993 6112->6113 6114 6003f9b4 free 6112->6114 6115 6003f9a6 free 6113->6115 6116 6003f99a CloseHandle 6113->6116 6114->6069 6115->6114 6116->6115 6118 600db65b OutputDebugStringA abort 6117->6118 6119 600db670 _vsnprintf 6117->6119 6118->6066 6119->6118 6121 600e64d3 6120->6121 6122 600e64dd calloc 6121->6122 6123 600e64e0 6121->6123 6126 600e64ed 6122->6126 6125 600e6508 calloc 6123->6125 6123->6126 6125->6126 6126->6078 6156 600e4390 GetModuleHandleW 6157 600e43c9 6156->6157 6158 600e43b1 GetProcAddress 6156->6158 6158->6157

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 600E6BAD
                                                                                                                    • CreateEventA.KERNEL32 ref: 600E6BD5
                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 600E6C17
                                                                                                                    • GetCurrentThread.KERNEL32 ref: 600E6C1B
                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 600E6C23
                                                                                                                    • DuplicateHandle.KERNELBASE ref: 600E6C4F
                                                                                                                    • GetThreadPriority.KERNEL32 ref: 600E6C66
                                                                                                                    • TlsSetValue.KERNEL32 ref: 600E6C92
                                                                                                                    • TlsGetValue.KERNEL32 ref: 600E6CD0
                                                                                                                    • abort.MSVCRT(?,?,?,431BDE83,600E9B07), ref: 6019242A
                                                                                                                    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,431BDE83,600E9B07), ref: 6019246C
                                                                                                                    • GetProcAddress.KERNEL32 ref: 6019248C
                                                                                                                    • GetProcAddress.KERNEL32 ref: 601924A0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Current$Thread$AddressHandleProcProcessValue$CreateDuplicateEventModulePriorityabort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1214264455-0
                                                                                                                    • Opcode ID: 236f23135b5d89f3cb4c06a187c8cfb0046fe36029e65a5745c1d9fe07f9eb78
                                                                                                                    • Instruction ID: e915a568f5e18e3e1f426d6f5f0c665b5738655c19bd6e66962b8c2fed16807d
                                                                                                                    • Opcode Fuzzy Hash: 236f23135b5d89f3cb4c06a187c8cfb0046fe36029e65a5745c1d9fe07f9eb78
                                                                                                                    • Instruction Fuzzy Hash: CA4126B18053008FDB00AF79D98931ABFF8FB55355F004A6DE894A7362E774D954CBA2

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4206212132-0
                                                                                                                    • Opcode ID: d78a90210c76e5a2b6417dc27f1dd522e6230d59ab4647d53ef74b660d17205a
                                                                                                                    • Instruction ID: 713350c3da0e976487b19910694c8c1590649592dd77fc60ad8bf66ee5b73b15
                                                                                                                    • Opcode Fuzzy Hash: d78a90210c76e5a2b6417dc27f1dd522e6230d59ab4647d53ef74b660d17205a
                                                                                                                    • Instruction Fuzzy Hash: 9301B9F09442068FD711DF3AC4817297FE4BB62319F850855E4405B352D738D99897E2

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _lock_unlockcalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3876498383-0
                                                                                                                    • Opcode ID: ab375ab5a348395aa2b1c41066fd2d73b620529a5e0c5ab71e7ee1146ade8483
                                                                                                                    • Instruction ID: 3f7e5ee77e883f8673cc9aaf2f1c30131088bc13792a89d4c7e2e13a814490d1
                                                                                                                    • Opcode Fuzzy Hash: ab375ab5a348395aa2b1c41066fd2d73b620529a5e0c5ab71e7ee1146ade8483
                                                                                                                    • Instruction Fuzzy Hash: 2F115E71A042119FDB40DF29D58071ABBE4FF99310F15C6A9D898EF346EB74D844CBA2

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 44 5fe512f0-5fe5130c 45 5fe51332-5fe51334 44->45 46 5fe5130e-5fe5131d 44->46 47 5fe51336-5fe5133d 45->47 48 5fe51329 45->48 50 5fe5132b-5fe51331 46->50 53 5fe5131f-5fe51321 46->53 51 5fe5133f 47->51 52 5fe51349-5fe51353 malloc 47->52 48->50 51->52 54 5fe51355-5fe5135b 52->54 55 5fe51323-5fe51327 52->55 53->50 53->55 55->48 56 5fe51360-5fe51397 call 5fe1beb0 call 5fe1bfc0 call 5fe1c340 55->56 56->50
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: malloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2803490479-0
                                                                                                                    • Opcode ID: cf30e3f8ef4daa56265915da22653f703b05a9560a876c0c26b8aa61ad415da6
                                                                                                                    • Instruction ID: adb6df29bf44fac9b5f83beabba12f700d18377302e20217c909c7c22830267b
                                                                                                                    • Opcode Fuzzy Hash: cf30e3f8ef4daa56265915da22653f703b05a9560a876c0c26b8aa61ad415da6
                                                                                                                    • Instruction Fuzzy Hash: 061161B1A083019BD7006F69DC9066FBBE4AF84658F414C2EE4D4D7A01E778E4808B83

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 700 600e6ad0-600e6ad7 701 600e6add-600e6b02 call 600e64c0 call 6003f4b0 700->701 702 600e6b88 700->702 707 600e6b04-600e6b12 TlsAlloc 701->707 708 600e6b40-600e6b43 701->708 709 600e6b18 707->709 710 60192425-60192477 abort * 2 GetModuleHandleA 707->710 711 600e6b45-600e6b78 fprintf call 6003f7e0 708->711 712 600e6b22-600e6b2c call 6003f7e0 708->712 709->712 715 601924a9-601924ae 710->715 716 60192479-601924a8 GetProcAddress * 2 710->716 719 600e6b2e-600e6b35 711->719 720 600e6b7a-600e6b80 711->720 712->719 712->720 716->715 719->708
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 600E64C0: calloc.MSVCRT ref: 600E654E
                                                                                                                    • TlsAlloc.KERNEL32(?,?,00000000,600E801E,?,?,?,431BDE83,600E9B07), ref: 600E6B04
                                                                                                                    • fprintf.MSVCRT ref: 600E6B69
                                                                                                                    • abort.MSVCRT(?,?,?,431BDE83,600E9B07), ref: 60192425
                                                                                                                    • abort.MSVCRT(?,?,?,431BDE83,600E9B07), ref: 6019242A
                                                                                                                    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,431BDE83,600E9B07), ref: 6019246C
                                                                                                                    • GetProcAddress.KERNEL32 ref: 6019248C
                                                                                                                    • GetProcAddress.KERNEL32 ref: 601924A0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProcabort$AllocHandleModulecallocfprintf
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2703921052-0
                                                                                                                    • Opcode ID: 4a4cd23b301967684272b5538af5ddac30e8c744c9fea7f7adf1b72019aaca21
                                                                                                                    • Instruction ID: ad5b60d5a1c0be2d8e43007db2ab93e90fb525d22be0a6333c5b7c22edcf21d7
                                                                                                                    • Opcode Fuzzy Hash: 4a4cd23b301967684272b5538af5ddac30e8c744c9fea7f7adf1b72019aaca21
                                                                                                                    • Instruction Fuzzy Hash: 6B3181B15042109FDB02AF29E88672EBFF8FF65359F01452EE584A7371D77488548B52
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3510742995-0
                                                                                                                    • Opcode ID: 79d3cb5a864bdc0b14ce0c9d731882356adca2f29bd61e5150b61395f1387a37
                                                                                                                    • Instruction ID: 44df5d0a70a6846838a28990d3adfb2672ec0498479aa100d4e8f7fd81a14024
                                                                                                                    • Opcode Fuzzy Hash: 79d3cb5a864bdc0b14ce0c9d731882356adca2f29bd61e5150b61395f1387a37
                                                                                                                    • Instruction Fuzzy Hash: 8751F3B4D453589FCB40DFA9C480ACEBBF4BF89708F10852EE884AB345D771A945CB91
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3510742995-0
                                                                                                                    • Opcode ID: b27257fc5bc0d2708a789ac6699c2922fce86aafa6017dbbb9918677ba7350dc
                                                                                                                    • Instruction ID: 97d009f98d2531f7b3e269b9bae04ae31c135d2dc07d08123c3ecba5af6a2159
                                                                                                                    • Opcode Fuzzy Hash: b27257fc5bc0d2708a789ac6699c2922fce86aafa6017dbbb9918677ba7350dc
                                                                                                                    • Instruction Fuzzy Hash: BD51F3B4D053589FCB40DFA4C480A9EBBF4BF9A708F10852EE884AB306D774A845CB91
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3510742995-0
                                                                                                                    • Opcode ID: 12e918720c7e8f8cf4ac68f1b2b76384dcc3a72def7c1b8b6f01e6e5058f4593
                                                                                                                    • Instruction ID: 4fdce6306d31f40f5e642dc6ca596a92c2be19b988373ef965d816a3e2c4e972
                                                                                                                    • Opcode Fuzzy Hash: 12e918720c7e8f8cf4ac68f1b2b76384dcc3a72def7c1b8b6f01e6e5058f4593
                                                                                                                    • Instruction Fuzzy Hash: EE51E3B8D05358DFCB40DFA5C580A9EBBF4BF9A308F10852EE844AB346D7759845CB91
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$malloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 962570267-0
                                                                                                                    • Opcode ID: 8443f56125083c51f94f1168ffaee58b85560c8aa668b5b4cf2f65c7d733277f
                                                                                                                    • Instruction ID: 60235e948ea90543dd3837ec57d5d3a3568b6a4af8ef52c6e0c3eb530da7db23
                                                                                                                    • Opcode Fuzzy Hash: 8443f56125083c51f94f1168ffaee58b85560c8aa668b5b4cf2f65c7d733277f
                                                                                                                    • Instruction Fuzzy Hash: D76118B15093408FD740DF69C58035AFFE0BFAA348F114E5EE4C8A7661E7B59288CB92
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 48687267faecea6a7b786770cbeec31724db766fa69aab1ec5322c59f81d31f9
                                                                                                                    • Instruction ID: c831e7e2fabe8ab4485375858caadcbd047e86cb291a40bf4ee78c73aa234a0a
                                                                                                                    • Opcode Fuzzy Hash: 48687267faecea6a7b786770cbeec31724db766fa69aab1ec5322c59f81d31f9
                                                                                                                    • Instruction Fuzzy Hash: 0D31DDB46093809FC3909F29C48034BBBE5BBD9758F508A1DF9D89B320D7B0E945CB92
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 578dac913a87140565fb5e1fe2579726b02b94776231f6b9c42837e57aaccc11
                                                                                                                    • Instruction ID: 3f60285f46e287d0dc03ee738d550de6150c80fbd6e3a08a0da1f67ad8e98742
                                                                                                                    • Opcode Fuzzy Hash: 578dac913a87140565fb5e1fe2579726b02b94776231f6b9c42837e57aaccc11
                                                                                                                    • Instruction Fuzzy Hash: DC31C2B46087028FD701AF68C58572FBBE2AFA5248F019C2DF9C59B345DB74D9488F92
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 69eb21136899658a4dfe9237e43069fad5832f9d7a41beae4120b01578682ceb
                                                                                                                    • Instruction ID: 29d17366f5fdbaba9fe7791a99e8e3d7120a29c620931992d22e1bd83a47307c
                                                                                                                    • Opcode Fuzzy Hash: 69eb21136899658a4dfe9237e43069fad5832f9d7a41beae4120b01578682ceb
                                                                                                                    • Instruction Fuzzy Hash: 7431C0B4A097018FD701AF69C98571FBBE2AFA5248F014C2DF9845B345EB74DA488B92
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 04fd1a9125bfd2236fb9ddb1cebcd5043b5ddcdea5d6fb7ae223072e2b11908c
                                                                                                                    • Instruction ID: 2dc878b56fe1926962febb38ea475ef72852d101993c09b8e0c0e5503fb7f60c
                                                                                                                    • Opcode Fuzzy Hash: 04fd1a9125bfd2236fb9ddb1cebcd5043b5ddcdea5d6fb7ae223072e2b11908c
                                                                                                                    • Instruction Fuzzy Hash: ABC002B5C057408BD610BF38950A229BAB06B62209F856DACE58427255E73AC6189A5B

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 63 600e9640-600e9664 64 600e966a 63->64 65 600e9852-600e9863 _errno 63->65 66 600e9738-600e9745 64->66 67 600e9818-600e984c GetCurrentProcess GetProcessTimes 64->67 68 600e9678-600e96ac GetCurrentThread GetThreadTimes 64->68 69 600e9750-600e9762 QueryPerformanceFrequency 64->69 70 600e9710-600e9717 GetSystemTimeAsFileTime 64->70 72 600e971d-600e9733 66->72 67->65 71 600e96b2-600e96be 67->71 68->65 68->71 69->65 73 600e9768-600e977a QueryPerformanceCounter 69->73 70->72 74 600e96c2-600e96ed call 600d5f60 71->74 72->74 73->65 76 600e9780-600e97fb call 600d5ae0 call 600d5800 73->76 82 600e96f0-600e96fc 74->82 76->82 86 600e9801-600e980e 76->86 84 600e9868-600e9894 call 600db380 82->84 85 600e9702-600e9709 82->85 89 600e989a-600e989c 84->89 90 600e9957-600e9968 _errno 84->90 86->82 92 600e9938-600e9942 89->92 93 600e98a2-600e98f9 call 600d5f60 89->93 91 600e990b-600e9915 90->91 94 600e996a-600e998b call 600db380 91->94 95 600e9917-600e991d 91->95 92->94 96 600e9944-600e9a65 92->96 114 600e98fb 93->114 115 600e9920-600e9930 93->115 105 600e9a10-600e9a16 _errno 94->105 106 600e9991-600e99e3 FileTimeToSystemTime 94->106 100 600e9a6b-600e9a74 96->100 101 600e9be2-600e9bee _errno 96->101 100->101 104 600e9a7a-600e9a80 100->104 107 600e9bb3-600e9bb8 101->107 110 600e9a82-600e9aa0 GetSystemTimeAsFileTime 104->110 111 600e9aa3-600e9ad2 104->111 109 600e9a1c-600e9a21 105->109 106->105 113 600e99e5-600e99f3 SetSystemTime 106->113 112 600e9bce-600e9bd8 107->112 117 600e99f5-600e99ff 109->117 110->111 118 600e9bcc 111->118 119 600e9ad8-600e9adc 111->119 120 600e9bda-600e9be1 112->120 121 600e9bf6-600e9c1e call 600db380 call 600e63d0 112->121 113->117 122 600e9a23-600e9a2f _errno 113->122 116 600e98ff-600e9906 call 600e9a40 114->116 115->116 116->91 126 600e9a31-600e9a36 call 600db380 117->126 127 600e9a01-600e9a09 117->127 118->112 125 600e9ae0-600e9afe 119->125 137 600e9c70-600e9c75 121->137 138 600e9c20-600e9c29 121->138 122->109 130 600e9b02 call 600e8010 125->130 133 600e9b07-600e9b0b 130->133 135 600e9bc0-600e9bc6 133->135 136 600e9b11-600e9b13 133->136 135->118 139 600e9b19-600e9b1b 135->139 136->125 140 600e9b15 136->140 144 600e9c38-600e9c4c call 600e6420 137->144 143 600e9c2b-600e9c2e 138->143 138->144 141 600e9ba7-600e9bad _errno 139->141 142 600e9b21-600e9b6f GetSystemTimeAsFileTime call 600d5ce0 139->142 140->139 141->107 152 600e9bf0-600e9bf4 142->152 153 600e9b71-600e9b99 call 600d5f60 142->153 146 600e9c5e-600e9c66 143->146 147 600e9c30-600e9c36 143->147 146->144 147->144 150 600e9c50-600e9c5a 147->150 150->144 154 600e9c5c 150->154 156 600e9ba1-600e9ba4 152->156 153->156 154->146 156->141
                                                                                                                    APIs
                                                                                                                    • GetCurrentThread.KERNEL32 ref: 600E9678
                                                                                                                    • GetThreadTimes.KERNEL32 ref: 600E96A1
                                                                                                                    • GetSystemTimeAsFileTime.KERNEL32 ref: 600E9717
                                                                                                                    • QueryPerformanceFrequency.KERNEL32 ref: 600E9757
                                                                                                                    • QueryPerformanceCounter.KERNEL32 ref: 600E976F
                                                                                                                    • GetCurrentProcess.KERNEL32 ref: 600E9818
                                                                                                                    • GetProcessTimes.KERNEL32 ref: 600E9841
                                                                                                                    • _errno.MSVCRT ref: 600E9852
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentPerformanceProcessQueryThreadTimeTimes$CounterFileFrequencySystem_errno
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3786581644-0
                                                                                                                    • Opcode ID: e2f3b6e125194667c19d3e7f5780a126fc8223f87b6e56733c91000477aa20dc
                                                                                                                    • Instruction ID: 8815469ec616cd7d4fceed5ce6d34a7023428e43de4bf003c79d66cee1fff41c
                                                                                                                    • Opcode Fuzzy Hash: e2f3b6e125194667c19d3e7f5780a126fc8223f87b6e56733c91000477aa20dc
                                                                                                                    • Instruction Fuzzy Hash: 36B112B55083008FC701DF6AC98464ABFF5FF89355F058A2EE899A7324E774D944CB92

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 158 600e54a0-600e54bb 159 600e55f0-600e5600 158->159 160 600e54c1-600e54c3 158->160 161 600e54ce-600e54e6 calloc 160->161 162 600e54c5-600e54c8 160->162 163 600e560f-600e5614 161->163 164 600e54ec-600e5553 CreateSemaphoreA * 2 161->164 162->161 165 600e5608-600e560d 162->165 168 600e5598-600e55a3 163->168 166 600e55b7-600e55b9 164->166 167 600e5555-600e5557 164->167 165->168 171 600e55bb-600e55c4 CloseHandle 166->171 172 600e55c7-600e55e5 free 166->172 169 600e55a8-600e55b4 CloseHandle 167->169 170 600e5559-600e5596 InitializeCriticalSection * 3 167->170 169->166 170->168 171->172
                                                                                                                    APIs
                                                                                                                    • calloc.MSVCRT ref: 600E54DD
                                                                                                                    • CreateSemaphoreA.KERNEL32 ref: 600E551F
                                                                                                                    • CreateSemaphoreA.KERNEL32 ref: 600E5546
                                                                                                                    • InitializeCriticalSection.KERNEL32 ref: 600E5565
                                                                                                                    • InitializeCriticalSection.KERNEL32 ref: 600E5570
                                                                                                                    • InitializeCriticalSection.KERNEL32 ref: 600E557B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalInitializeSection$CreateSemaphore$calloc
                                                                                                                    • String ID: l
                                                                                                                    • API String ID: 2075313795-2517025534
                                                                                                                    • Opcode ID: b87a819eb010998fb99ab447ef0515197c3b5e6eb35e97deb8e58984e3739c67
                                                                                                                    • Instruction ID: 98c3bdbef643ce83e737de0bc075614b00230ccfa11c16bba5ff9c991ef034a9
                                                                                                                    • Opcode Fuzzy Hash: b87a819eb010998fb99ab447ef0515197c3b5e6eb35e97deb8e58984e3739c67
                                                                                                                    • Instruction Fuzzy Hash: D841BFB29043008FEB10AF29D94835ABFF4FF81315F118A6DD8A49B295E775D454CF82

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 173 600ebb90-600ebbb3 174 600ebbb8-600ebbbc 173->174 175 600ebbc0-600ebbd4 174->175 175->175 176 600ebbd6-600ebbd8 175->176 177 600ebbde-600ebbe4 176->177 178 600ebc64-600ebc66 176->178 179 600ebbe6-600ebbee 177->179 180 600ebc60-600ebc62 177->180 181 600ebc2a-600ebc34 178->181 183 600ebc50-600ebc56 179->183 184 600ebbf0 179->184 182 600ebc05-600ebc28 call 600ebd40 call 600eba50 180->182 185 600ebc36-600ebc3d 181->185 186 600ebc72-600ebc82 call 600db380 181->186 182->174 182->181 183->182 187 600ebbf2-600ebbf5 184->187 188 600ebc40-600ebc42 184->188 204 600ebc84-600ebc8c 186->204 205 600ebcb0-600ebcb2 186->205 192 600ebc44-600ebc4d 187->192 193 600ebbf7-600ebbfa 187->193 191 600ebc6d 188->191 188->192 196 6018f820-6018f82a 191->196 192->182 197 600ebbfc-600ebc03 193->197 198 600ebc68 193->198 201 6018f82c abort 196->201 202 6018f831-6018f842 call 600db380 196->202 197->182 198->196 201->202 224 6018f849-6018f86f call 600db380 call 6018dce0 call 6018a710 call 6018dce0 call 6018df70 202->224 225 6018f844 abort 202->225 207 600ebc8e 204->207 208 600ebcd8-600ebce3 call 600d8c80 204->208 209 600ebca0-600ebca2 207->209 210 600ebc90-600ebc92 207->210 215 600ebcc8-600ebcca 209->215 216 600ebca4-600ebcaf call 600d8c40 209->216 213 600ebcb8 210->213 214 600ebc94-600ebc9f call 600d8c90 210->214 219 6018f818-6018f81f abort 213->219 220 600ebcbe-600ebcc3 213->220 215->220 223 600ebccc 215->223 219->196 223->219 239 6018f871 224->239 240 6018f8e2-6018f8e5 224->240 225->224 241 6018f873-6018f893 call 600ebac0 call 600ebb90 239->241 240->241 246 6018f895-6018f8aa call 600ebb90 241->246 247 6018f907-6018f911 241->247 254 6018f918-6018f920 call 600ebe90 call 600db380 246->254 255 6018f8ac-6018f8c8 call 6018dc80 246->255 249 6018f913 call 6018e1b0 247->249 250 6018f925 call 600db380 247->250 249->254 256 6018f92a-6018f977 call 600db380 abort call 6018dce0 abort call 6018dc80 call 6018e210 250->256 254->250 255->256 263 6018f8ca-6018f8dd call 6018e210 255->263 273 6018fa29-6018fa33 call 6018dce0 call 6018de30 256->273 274 6018f97d-6018f9e2 call 6018dce0 fwrite fputs fputc call 6018de30 256->274 263->240 282 6018f9e7-6018f9f1 273->282 274->282 283 6018f9f3-6018fa0a abort free 282->283 284 6018fa24 call 600db380 282->284 283->284 286 6018fa0c-6018fa22 call 6018e1b0 call 6018de30 283->286 284->273 286->284 295 6018fa35-6018fa48 call 600d8f90 call 60183cf0 286->295
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 76be0989f39cfa2efb7634b0ee8f93a3cefcf0fcd66ca1f765f648971b9501bc
                                                                                                                    • Instruction ID: 75cd61ab3e7a5bcba327cebaf8051e0ac3d25c7a16bd25003e08914e9a3606a6
                                                                                                                    • Opcode Fuzzy Hash: 76be0989f39cfa2efb7634b0ee8f93a3cefcf0fcd66ca1f765f648971b9501bc
                                                                                                                    • Instruction Fuzzy Hash: B971BD709483098FC701EFB9C48272EBBE5AFB2308F51481DE494A7365DB749A459FA3

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 299 600e5620-600e563f 300 600e5645-600e5654 call 600e7ac0 299->300 301 600e5850-600e5861 call 6003fdb0 299->301 308 600e565a 300->308 309 600e5710-600e5718 300->309 306 600e5898-600e58b2 WaitForSingleObject 301->306 307 600e5863-600e5868 301->307 315 600e58b8-600e58ba 306->315 316 600e57a9-600e57b3 306->316 310 600e586a-600e586c 307->310 311 600e5890 307->311 312 600e565e-600e567f call 6003fe90 308->312 313 600e576d-600e5782 call 6003fdb0 309->313 314 600e571a-600e5732 call 6003fdb0 309->314 319 600e57a4 310->319 320 600e5872-600e5874 310->320 311->306 331 600e5685 312->331 332 600e58c0 312->332 329 600e5788-600e578d 313->329 330 600e5820-600e5827 call 600e7c90 313->330 333 600e57c8-600e57cf 314->333 334 600e5738-600e573d 314->334 315->316 317 600e57b9-600e57c2 316->317 318 600e58f5-600e5943 call 600db380 EnterCriticalSection LeaveCriticalSection 316->318 353 600e5958-600e5980 call 600e5620 EnterCriticalSection 318->353 354 600e5945-600e5950 318->354 319->316 320->316 339 600e578f-600e5791 329->339 340 600e5760-600e5767 call 600e7c90 329->340 360 600e582d-600e584b WaitForSingleObject 330->360 361 600e58e0-600e58e5 330->361 341 600e5687-600e5689 331->341 342 600e56c0-600e56ca 331->342 345 600e58d0-600e58d5 332->345 336 600e5752-600e5757 333->336 337 600e57d1-600e57d8 call 600e7c90 333->337 343 600e5743-600e5747 334->343 344 600e57e0-600e57e2 334->344 336->316 348 600e5759 336->348 337->336 374 600e57de 337->374 357 600e5797-600e579e call 600e7c90 339->357 358 600e5814-600e5816 339->358 340->313 340->361 341->358 359 600e568f-600e5692 341->359 349 600e5880 342->349 350 600e56d0-600e56ea WaitForSingleObject 342->350 343->316 346 600e5749-600e5750 343->346 355 600e57f8-600e580e WaitForSingleObject 344->355 356 600e57e4-600e57eb call 600e7c90 344->356 345->336 346->336 346->337 362 600e5759 call 600e7e30 348->362 349->311 350->358 367 600e56f0-600e56f5 350->367 378 600e5998-600e59a0 353->378 379 600e5982-600e5993 LeaveCriticalSection 353->379 355->345 355->358 356->319 383 600e57ed-600e57ef 356->383 357->319 357->361 358->316 359->349 366 600e5698-600e56ad ResetEvent 359->366 360->316 361->319 370 600e58eb 361->370 372 600e575e 362->372 366->370 371 600e56b3 366->371 367->316 373 600e56fb-600e5702 call 600e7c90 367->373 381 600e58eb call 600e7e30 370->381 380 600e56b3 call 600e7e30 371->380 372->316 373->316 387 600e5708 373->387 374->319 378->379 384 600e56b8 380->384 385 600e58f0 381->385 383->314 384->312 385->319 387->319
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 600E7AC0: TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000030,76ECE820), ref: 600E7AD0
                                                                                                                      • Part of subcall function 6003FE90: WaitForMultipleObjects.KERNEL32 ref: 6003FF03
                                                                                                                    • ResetEvent.KERNEL32 ref: 600E569F
                                                                                                                      • Part of subcall function 600E7E30: TlsGetValue.KERNEL32(?,?,00000000,?,600E8065,?,?,?,?,431BDE83,600E9B07), ref: 600E7E42
                                                                                                                    • WaitForSingleObject.KERNEL32 ref: 600E56DF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ValueWait$EventMultipleObjectObjectsResetSingle
                                                                                                                    • String ID: (
                                                                                                                    • API String ID: 2327612466-3887548279
                                                                                                                    • Opcode ID: f43ed9fa60766f2535b561fe6f45ed87241cc72af970a281467394686eca0c05
                                                                                                                    • Instruction ID: 8e63f30630ea833ae7947d4969b1341916dd59730c50ade57df93542cece519f
                                                                                                                    • Opcode Fuzzy Hash: f43ed9fa60766f2535b561fe6f45ed87241cc72af970a281467394686eca0c05
                                                                                                                    • Instruction Fuzzy Hash: 5461EE3890C311CFD711AF6BAA4531EBEE4AFA5746F500C2DE984B3251EA31CC548BA3

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 403 5fdd7610-5fdd7655 404 5fdd765b-5fdd765d 403->404 405 5fdd79e0-5fdd79e8 403->405 406 5fdd765f-5fdd7667 404->406 407 5fdd76a0-5fdd76b5 404->407 411 5fdd79f5-5fdd7a15 call 5fe512f0 405->411 408 5fdd766d-5fdd7683 406->408 409 5fdd7be0-5fdd7bf0 406->409 410 5fdd76b7-5fdd76c7 407->410 408->410 412 5fdd7685-5fdd7695 408->412 409->410 413 5fdd76c9-5fdd76d4 410->413 414 5fdd76ea-5fdd7710 410->414 419 5fdd7a1b-5fdd7a24 411->419 420 5fdd7870 411->420 412->410 413->414 416 5fdd76d6-5fdd76e6 413->416 417 5fdd7714-5fdd7765 call 600d5f60 414->417 416->414 429 5fdd7767-5fdd77cb strlen 417->429 422 5fdd7a46-5fdd7a56 419->422 423 5fdd7a26-5fdd7a2b 419->423 425 5fdd7872-5fdd7879 420->425 427 5fdd7a5c 422->427 428 5fdd7845-5fdd784d 422->428 423->420 426 5fdd7a31-5fdd7a41 memcpy 423->426 426->422 430 5fdd7a60-5fdd7a6e 427->430 431 5fdd784f-5fdd7854 428->431 432 5fdd7890 428->432 433 5fdd77d1-5fdd77e8 429->433 434 5fdd7990-5fdd7996 429->434 430->428 438 5fdd7856-5fdd785c 431->438 439 5fdd7810-5fdd781d 431->439 435 5fdd7894-5fdd789a 432->435 440 5fdd79ae-5fdd79d1 call 5fdd6700 433->440 441 5fdd77ee-5fdd77f7 433->441 436 5fdd799c-5fdd79a8 434->436 437 5fdd7a73-5fdd7a75 434->437 443 5fdd789c-5fdd78af 435->443 444 5fdd78d5-5fdd78e4 435->444 436->440 436->441 445 5fdd7a7b-5fdd7a8a 437->445 446 5fdd7c51 437->446 438->420 447 5fdd785e-5fdd786b 438->447 439->420 442 5fdd781f-5fdd7824 439->442 440->441 462 5fdd79d7 440->462 441->435 449 5fdd77fd-5fdd7807 441->449 450 5fdd7826-5fdd7828 442->450 451 5fdd7880-5fdd7882 442->451 452 5fdd78b0-5fdd78ca call 5fdd6700 443->452 453 5fdd78fd-5fdd7918 call 5fdd6700 444->453 454 5fdd7acc-5fdd7ad1 445->454 447->450 455 5fdd786d 447->455 449->431 459 5fdd782e-5fdd7830 450->459 460 5fdd7920-5fdd7926 450->460 464 5fdd783d-5fdd7842 451->464 465 5fdd7884-5fdd788c 451->465 452->420 475 5fdd78cc-5fdd78cf 452->475 478 5fdd791a 453->478 479 5fdd78f0-5fdd78f5 453->479 457 5fdd7a90-5fdd7a96 454->457 458 5fdd7ad3-5fdd7ad9 454->458 455->420 457->420 469 5fdd7a9c-5fdd7aa1 457->469 458->420 466 5fdd7adf-5fdd7ae5 458->466 459->428 467 5fdd7832-5fdd7837 459->467 460->420 472 5fdd792c-5fdd7947 460->472 462->420 464->428 465->431 471 5fdd788e 465->471 466->420 474 5fdd7aeb-5fdd7aed 466->474 467->430 467->464 476 5fdd7aa7-5fdd7aa9 469->476 477 5fdd7b50-5fdd7b52 469->477 471->432 472->411 473 5fdd794d-5fdd796b call 5fe513c0 472->473 473->420 494 5fdd7971-5fdd7985 473->494 481 5fdd7aef-5fdd7af5 474->481 482 5fdd7aab-5fdd7aad 474->482 475->452 483 5fdd78d1 475->483 476->481 476->482 486 5fdd7b58 477->486 487 5fdd7aba-5fdd7abf 477->487 478->420 484 5fdd78fb 479->484 485 5fdd7bf5-5fdd7bfb 479->485 481->420 489 5fdd7afb-5fdd7b12 481->489 492 5fdd7ac3-5fdd7ac6 482->492 493 5fdd7aaf-5fdd7ab4 482->493 483->444 484->453 490 5fdd7bfd-5fdd7c0c 485->490 491 5fdd7c36-5fdd7c3b 485->491 486->492 487->492 495 5fdd7b14-5fdd7b32 call 5fe513c0 489->495 496 5fdd7b60-5fdd7b80 call 5fe512f0 489->496 497 5fdd7c15-5fdd7c2f call 5fdd6700 490->497 491->425 492->454 499 5fdd7c40-5fdd7c44 492->499 493->487 498 5fdd7bc4-5fdd7bd3 493->498 494->434 495->420 506 5fdd7b38-5fdd7b49 495->506 496->420 509 5fdd7b86-5fdd7b91 496->509 507 5fdd7c31 497->507 508 5fdd7c10-5fdd7c13 497->508 498->492 499->446 506->482 507->420 508->491 508->497 510 5fdd7bb5-5fdd7bbe 509->510 511 5fdd7b93-5fdd7b98 509->511 510->492 510->498 511->420 512 5fdd7b9e-5fdd7bae memcpy 511->512 512->510
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: strlen
                                                                                                                    • String ID: $ $+$0123456789ABCDEF$0123456789abcdef
                                                                                                                    • API String ID: 39653677-2690344263
                                                                                                                    • Opcode ID: 562877342ebff19b44322b62e610063b150340c7ab616b7cf3c733d2abbfce10
                                                                                                                    • Instruction ID: 5abcfe8ac4becf1ec1d8dd1174c7bcc094fc10ca710b7a7c2c1475e3cb9bab75
                                                                                                                    • Opcode Fuzzy Hash: 562877342ebff19b44322b62e610063b150340c7ab616b7cf3c733d2abbfce10
                                                                                                                    • Instruction Fuzzy Hash: 210239B46093818FC794CF28C09075ABBE1BF89648F548DADF998DB351D775E940CB82

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 513 5fdcfc10-5fdcfc39 call 5fe50580 516 5fdcfc3b 513->516 517 5fdcfc50-5fdcfc60 call 5fe64f80 513->517 518 5fdcfc3d-5fdcfc46 516->518 521 5fdcfc66-5fdcfc6b 517->521 522 5fdcff00-5fdcff1e call 5fe51180 517->522 524 5fdcfc6d-5fdcfc72 521->524 525 5fdcfcd0-5fdcfcd5 521->525 522->516 530 5fdcff24-5fdcff44 call 5fe512f0 522->530 526 5fdcfc74-5fdcfc7a 524->526 527 5fdcfcd7-5fdcfce7 call 5fe64f80 524->527 525->526 525->527 531 5fdcfc80-5fdcfc83 526->531 532 5fdd0020-5fdd003e call 5fe64f80 526->532 538 5fdcfced-5fdcfcfb call 5fe9d650 527->538 539 5fdcfe50-5fdcfe66 call 5fdcf8f0 527->539 547 5fdcff74-5fdcff8e call 5fe513a0 530->547 548 5fdcff46-5fdcff6e call 5ff64530 call 5fe64fc0 530->548 535 5fdcfc89-5fdcfc8c 531->535 536 5fdd0090-5fdd00a6 531->536 550 5fdd00ca-5fdd0107 call 5fe1beb0 call 5fe1bfc0 call 5fe1c340 532->550 551 5fdd0044-5fdd0077 call 5fe513a0 call 5fe9d400 532->551 541 5fdd00b0-5fdd00bd call 5fe1beb0 535->541 542 5fdcfc92-5fdcfc97 535->542 536->518 563 5fdcfe80-5fdcfe85 538->563 564 5fdcfd01-5fdcfd0a 538->564 561 5fdcfe8c-5fdcfe98 539->561 562 5fdcfe68-5fdcfe74 call 5fe64f80 539->562 541->550 542->516 549 5fdcfc99-5fdcfcab call 5fe4c050 542->549 547->518 548->521 548->547 577 5fdcfda0-5fdcfdf0 call 5fe1beb0 call 5fe1bfc0 call 5fe1c340 call 5fe64f80 549->577 578 5fdcfcb1-5fdcfccd SwitchToFiber call 5fe4c050 549->578 580 5fdd007c-5fdd008a 550->580 551->580 561->518 562->563 571 5fdcfe87-5fdcfe8a 563->571 572 5fdcfea0-5fdcfeb0 563->572 573 5fdcfe40-5fdcfe47 564->573 574 5fdcfd10-5fdcfd37 call 5fe512f0 564->574 571->561 571->572 585 5fdcfeb7 call 5fe514d0 572->585 579 5fdcfd58-5fdcfd93 call 5fe4c100 SwitchToFiber call 5fe4c050 573->579 595 5fdd010c-5fdd011c call 5fe64f80 574->595 596 5fdcfd3d-5fdcfd55 memcpy 574->596 623 5fdcfdf6-5fdcfe3f call 5fe513a0 call 5fe9d400 577->623 624 5fdcff93-5fdcffd0 call 5fe1beb0 call 5fe1bfc0 call 5fe1c340 577->624 578->525 579->525 580->518 590 5fdcfebc-5fdcfec0 585->590 590->561 597 5fdcfec2-5fdcfeed CreateFiber 590->597 609 5fdd015c-5fdd0199 call 5fe1beb0 call 5fe1bfc0 call 5fe1c340 595->609 610 5fdd011e-5fdd0149 call 5fe513a0 call 5fe9d400 595->610 596->579 602 5fdcffd5-5fdd0016 call 5fe513a0 DeleteFiber call 5fe513a0 597->602 603 5fdcfef3 597->603 602->561 603->522 625 5fdd014e-5fdd0157 609->625 610->625 624->602 625->518
                                                                                                                    APIs
                                                                                                                    • SwitchToFiber.KERNEL32(?,?,?,?,5FD21CE1,5FD370E0,?,5FD3742C,?,?,?,?,?,?,?,?), ref: 5FDCFCB9
                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,5FD21CE1,5FD370E0,?,5FD3742C,?,?,?,?,?,?,?), ref: 5FDCFD50
                                                                                                                    • SwitchToFiber.KERNEL32(?,?,?,?,?,5FD21CE1,5FD370E0,?,5FD3742C,?,?,?,?,?,?,?), ref: 5FDCFD7C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FiberSwitch$memcpy
                                                                                                                    • String ID: `
                                                                                                                    • API String ID: 148397844-2679148245
                                                                                                                    • Opcode ID: 24accb1ecb98a7c587e9c3a85e0f480978ee7182867bef6de44dec4d60a7bbdb
                                                                                                                    • Instruction ID: ab12f7c0d111144eeb153d661956aca5cfb92654e68710fd316b129ca077e6c8
                                                                                                                    • Opcode Fuzzy Hash: 24accb1ecb98a7c587e9c3a85e0f480978ee7182867bef6de44dec4d60a7bbdb
                                                                                                                    • Instruction Fuzzy Hash: CBD1E0F09097019FD740AFA4D59475AFBE4AF85384F01881EE8D89B345D7B4E884CBE2

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 600E6AD0: TlsAlloc.KERNEL32(?,?,00000000,600E801E,?,?,?,431BDE83,600E9B07), ref: 600E6B04
                                                                                                                    • TlsGetValue.KERNEL32(?,?,00000000,?,600E8065,?,?,?,?,431BDE83,600E9B07), ref: 600E7E42
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1189806713-0
                                                                                                                    • Opcode ID: 047214eca7c4074dde24b8696394c83f95db8e668e83895148d324ee0eb98906
                                                                                                                    • Instruction ID: 389cad2e23e51e84ed704bb74ba9b4e7a3e539ca1d0f6b05eb39c0690074f811
                                                                                                                    • Opcode Fuzzy Hash: 047214eca7c4074dde24b8696394c83f95db8e668e83895148d324ee0eb98906
                                                                                                                    • Instruction Fuzzy Hash: E341B6716042114FDB01BF7EA88532A7FE5AF65258F110A79E999E7357EB30CC408792

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 723 600e66e0-600e677a GetCurrentThreadId call 600ea980 OutputDebugStringA abort call 600e63d0 728 600e6818-600e681a 723->728 729 600e6780-600e6782 723->729 731 600e679d-600e679f 728->731 729->728 730 600e6788 729->730 732 600e6790-600e6797 730->732 733 600e67f0-600e6811 fprintf 731->733 734 600e67a1-600e67a5 731->734 732->733 735 600e6799-600e679b 732->735 736 600e67a7-600e67b8 call 600e6420 733->736 734->736 737 600e67c0-600e67d0 call 6003f980 734->737 735->731 735->732 743 600e67df-600e67e4 737->743 744 600e67d2 737->744 745 600e67d5-600e67dd free 743->745 744->745 745->736
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentDebugOutputStringThreadabortfprintf
                                                                                                                    • String ID: 5
                                                                                                                    • API String ID: 4086887302-2226203566
                                                                                                                    • Opcode ID: 110fe61611595884eae3c0bdfdf35a68f4a58b2a68b8d9f4fe7838a17bfd008d
                                                                                                                    • Instruction ID: 20730b98303cd3e82b8a83d87a156f7101cc683c4b49f8ecd939c1ac82056357
                                                                                                                    • Opcode Fuzzy Hash: 110fe61611595884eae3c0bdfdf35a68f4a58b2a68b8d9f4fe7838a17bfd008d
                                                                                                                    • Instruction Fuzzy Hash: 38318FB18087019FCB11AF76D88575EBFF4BF65348F028A2DE598B7211E7709984CB92

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 746 600e7bb0-600e7bcb call 600e6cc0 749 600e7bcd call 600e6cf0 746->749 750 600e7bd2-600e7bd6 746->750 749->750 752 600e7bec-600e7bff TlsGetValue 750->752 753 600e7bd8-600e7be6 longjmp 750->753 754 600e7c2d-600e7c30 _endthreadex 752->754 755 600e7c01-600e7c08 752->755 753->752 758 600e7c36-600e7c4b CloseHandle 754->758 756 600e7c6d-600e7c75 755->756 757 600e7c0a-600e7c16 755->757 759 600e7c77-600e7c80 CloseHandle 756->759 760 600e7c81-600e7c89 756->760 761 600e7c18-600e7c21 CloseHandle 757->761 762 600e7c22-600e7c2b 757->762 763 600e7c4e-600e7c6b call 600e6ab0 TlsSetValue 758->763 759->760 760->763 761->762 762->754 762->758 763->754
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 600E6B90: TlsGetValue.KERNEL32 ref: 600E6CD0
                                                                                                                    • longjmp.MSVCRT ref: 600E7BE6
                                                                                                                    • TlsGetValue.KERNEL32(?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE,?,?,?,00000000,?), ref: 600E7BF4
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE,?,?,?,00000000), ref: 600E7C1B
                                                                                                                    • _endthreadex.MSVCRT(?,?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE,?,?,?,00000000), ref: 600E7C30
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE,?,?,?,00000000), ref: 600E7C42
                                                                                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE), ref: 600E7C63
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,0000001C,600E7D9F,?,?,?,?,00000000,600E7EDE,?,?,?,00000000), ref: 600E7C7A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleValue$_endthreadexlongjmp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3990644698-0
                                                                                                                    • Opcode ID: 7321d87c280a7121c6935a6dd5f8e782c3a5d88116c811133101eaf330c0ab98
                                                                                                                    • Instruction ID: e01d561fbb1268bd99f9590a18244030e167ddfc4fd02fb19947a0279997162d
                                                                                                                    • Opcode Fuzzy Hash: 7321d87c280a7121c6935a6dd5f8e782c3a5d88116c811133101eaf330c0ab98
                                                                                                                    • Instruction Fuzzy Hash: AD21ECB06047018FDB01AF35C9887167FF8EF29709F11486DE989EB266E734D840CB91
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: malloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2803490479-0
                                                                                                                    • Opcode ID: d329a198d378bfa6feb9d731a8cacb5950a5312160c4e23ecc092d9a2b64d605
                                                                                                                    • Instruction ID: 7cc428a6b9a04dae9dfb96500fe2c28e81cddce9a90ae63bf6dc4c94eb072d59
                                                                                                                    • Opcode Fuzzy Hash: d329a198d378bfa6feb9d731a8cacb5950a5312160c4e23ecc092d9a2b64d605
                                                                                                                    • Instruction Fuzzy Hash: CE212AB06083019FC700BFB9C48672EBBE4AF75318F41482DE4D89B256DBB489408F63
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: `$e
                                                                                                                    • API String ID: 0-2074502723
                                                                                                                    • Opcode ID: 92182cc05056ec55ab9dd468f7047b96401e4d80e677c380aaa854485a574aa2
                                                                                                                    • Instruction ID: 828a80af0752195a9f1bc385b68ffab1be798e09291e9ea1cd215a3523ec3124
                                                                                                                    • Opcode Fuzzy Hash: 92182cc05056ec55ab9dd468f7047b96401e4d80e677c380aaa854485a574aa2
                                                                                                                    • Instruction Fuzzy Hash: FA71C8F090A3029BD740AFA5D59475EFBE4AF94784F01882DE4C89B341DBB9D484CBA2
                                                                                                                    APIs
                                                                                                                    • calloc.MSVCRT ref: 600E9E98
                                                                                                                    • free.MSVCRT ref: 600E9F27
                                                                                                                    • free.MSVCRT ref: 600E9F4F
                                                                                                                      • Part of subcall function 600E54A0: calloc.MSVCRT ref: 600E54DD
                                                                                                                      • Part of subcall function 600E54A0: CreateSemaphoreA.KERNEL32 ref: 600E551F
                                                                                                                      • Part of subcall function 600E54A0: CreateSemaphoreA.KERNEL32 ref: 600E5546
                                                                                                                      • Part of subcall function 600E54A0: InitializeCriticalSection.KERNEL32 ref: 600E5565
                                                                                                                      • Part of subcall function 600E54A0: InitializeCriticalSection.KERNEL32 ref: 600E5570
                                                                                                                      • Part of subcall function 600E54A0: InitializeCriticalSection.KERNEL32 ref: 600E557B
                                                                                                                    • free.MSVCRT ref: 600E9F97
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalInitializeSectionfree$CreateSemaphorecalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3430360044-3916222277
                                                                                                                    • Opcode ID: 5e17245b14a16c47887db4d77e7442e1f41ca2bef3267d77ef55ec6c467aa379
                                                                                                                    • Instruction ID: c6567531f6de664a66f5f828a031c7ed8d62f410dbdd25af92ae09aa663d0e82
                                                                                                                    • Opcode Fuzzy Hash: 5e17245b14a16c47887db4d77e7442e1f41ca2bef3267d77ef55ec6c467aa379
                                                                                                                    • Instruction Fuzzy Hash: 51313EB16093019FD3049F26E48535FFBE5EF95318F06882EE4889B356E376C849CB92
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$FileSystem_errno
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3586254970-0
                                                                                                                    • Opcode ID: 7539fede6aeeed75b868000ebfe56e3c3bfb63d62e77278ac7877c1d17cc4b45
                                                                                                                    • Instruction ID: db84d53a86e8ab66c2923d66f21d55863f89f84380e48ae86e88f5ede2f167ce
                                                                                                                    • Opcode Fuzzy Hash: 7539fede6aeeed75b868000ebfe56e3c3bfb63d62e77278ac7877c1d17cc4b45
                                                                                                                    • Instruction Fuzzy Hash: 1F5169726083048FC700DF2AD98470ABFE5FFD9314F658A2DE898A7364E770D9058B82
                                                                                                                    APIs
                                                                                                                    • abort.MSVCRT(?,?,?,?,?,?,600EBC17), ref: 6018F810
                                                                                                                    • abort.MSVCRT(?,?,?,?,?,?,600EBB6C), ref: 6018F818
                                                                                                                    • abort.MSVCRT(?,?,?,?,?,?,600EBC17), ref: 6018F82C
                                                                                                                    • abort.MSVCRT(?,?,?,?,?,?,600EBC17), ref: 6018F844
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4206212132-0
                                                                                                                    • Opcode ID: 3a96e6545b1c46b67c72e114f781b3c28b144275557c3da0f88936422119e5a5
                                                                                                                    • Instruction ID: 7d3b2821010b0d01db8186eb1c75e727239b1351ac75b616fb516857ea4a8552
                                                                                                                    • Opcode Fuzzy Hash: 3a96e6545b1c46b67c72e114f781b3c28b144275557c3da0f88936422119e5a5
                                                                                                                    • Instruction Fuzzy Hash: 6441E2716483098FC704DF69D481B9ABBE1FFE231CF14896DE0945B319D7319906DBA2
                                                                                                                    APIs
                                                                                                                    • QueryPerformanceCounter.KERNEL32 ref: 6003FB60
                                                                                                                    • GetTickCount.KERNEL32 ref: 6003FB6D
                                                                                                                    • QueryPerformanceFrequency.KERNEL32 ref: 6003FBD7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PerformanceQuery$CountCounterFrequencyTick
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 713402817-0
                                                                                                                    • Opcode ID: 2364ef64273082fd1ba8cf8e516bb5660aabb9000298dc492ab4f40d04ac7054
                                                                                                                    • Instruction ID: 57e7bf9e325d9b1a17682a757e6b448a7a52d6b026b932c10b379a6b8d5ee2bf
                                                                                                                    • Opcode Fuzzy Hash: 2364ef64273082fd1ba8cf8e516bb5660aabb9000298dc492ab4f40d04ac7054
                                                                                                                    • Instruction Fuzzy Hash: 1B3106B49083118FC705EF38C58461ABFE5BB99315F018A2CE89997364E734D849CF52
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: strlen$strcpy
                                                                                                                    • String ID: B
                                                                                                                    • API String ID: 2790333442-1255198513
                                                                                                                    • Opcode ID: 54d31950d31bf75d8124eed05dd146b17fed716733eae6e8aa3c61cae9b500da
                                                                                                                    • Instruction ID: 31ae26e93bd3b0076898946cbe1aa34b9bfb156a0d890d329122004f0802864d
                                                                                                                    • Opcode Fuzzy Hash: 54d31950d31bf75d8124eed05dd146b17fed716733eae6e8aa3c61cae9b500da
                                                                                                                    • Instruction Fuzzy Hash: 15214CF58097419FD700AF69C48479EBBE1FF80348F45486EE8889B202E779D4849B93
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 6016A49E
                                                                                                                    • memmove.MSVCRT(?,?,?,?,?,00000000,00000000,?,?,5FD27F62), ref: 6016A4BE
                                                                                                                    • memset.MSVCRT ref: 6016A5B4
                                                                                                                      • Part of subcall function 6018DBF0: malloc.MSVCRT ref: 6018DC07
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$mallocmemmove
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1346079573-0
                                                                                                                    • Opcode ID: 6606eabb0d41b8ddee3705f35de6be955ff2b78a866a6fadcceb703d12fd1160
                                                                                                                    • Instruction ID: 3386462219de90d134375f75d181aa06d905b8b4978c39b17f262a0556aa7005
                                                                                                                    • Opcode Fuzzy Hash: 6606eabb0d41b8ddee3705f35de6be955ff2b78a866a6fadcceb703d12fd1160
                                                                                                                    • Instruction Fuzzy Hash: E35118B16087028FC304DF29D98061BFBE1AFE8754F15892EE8998B315DB31E945CF92
                                                                                                                    APIs
                                                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0000001C,?,600EA59B), ref: 600E5B96
                                                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,0000001C,?,600EA59B), ref: 600E5C26
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3168844106-0
                                                                                                                    • Opcode ID: 24c04227735f66bc2fa87bcfdb511c69e181c55667db49c9953560b645de03c0
                                                                                                                    • Instruction ID: 4423da5fd5462d706c7b7afc97fb8bf48ca91d006ae88f77899a1eaf95c7cb9c
                                                                                                                    • Opcode Fuzzy Hash: 24c04227735f66bc2fa87bcfdb511c69e181c55667db49c9953560b645de03c0
                                                                                                                    • Instruction Fuzzy Hash: 7B318EB55087008FDB04EF2AD8C475A7BE1FF54325F544969EC159F289E331E984CB92
                                                                                                                    APIs
                                                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0000001C,00000030,00000050,?,600E5BD1), ref: 600E5920
                                                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,0000001C,00000030,00000050,?,600E5BD1), ref: 600E593C
                                                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,0000001C,00000030,00000050,?,600E5BD1), ref: 600E5979
                                                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,0000001C,00000030,00000050,?,600E5BD1), ref: 600E5985
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000009.00000002.1839065984.000000005FD21000.00000020.00000001.01000000.0000000C.sdmp, Offset: 5FD20000, based on PE: true
                                                                                                                    • Associated: 00000009.00000002.1839048095.000000005FD20000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841163258.0000000060199000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.00000000601A0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1841192165.000000006026E000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842090408.0000000060355000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842114490.0000000060356000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842138428.0000000060357000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    • Associated: 00000009.00000002.1842163506.000000006035B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_9_2_5fd20000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3168844106-0
                                                                                                                    • Opcode ID: 747ee646184167911b15ba8d6bea19fdac78e090f588c236218082f331b4e464
                                                                                                                    • Instruction ID: e6acd160b1b36b612d5df869e36c21181b786840d816d3f017a07e750c9b22ff
                                                                                                                    • Opcode Fuzzy Hash: 747ee646184167911b15ba8d6bea19fdac78e090f588c236218082f331b4e464
                                                                                                                    • Instruction Fuzzy Hash: 6711DAB5A087118FC701EF3AE98550ABBF4EF99761F01492DE98897311D231E8548B93

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:6.8%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:0%
                                                                                                                    Total number of Nodes:82
                                                                                                                    Total number of Limit Nodes:7
                                                                                                                    execution_graph 6406 829a60 6407 829a6a 6406->6407 6408 829ac4 Sleep 6407->6408 6409 829aa1 6407->6409 6408->6409 6414 884f3c 6415 884f5b RegOpenKeyExW RegQueryValueExW 6414->6415 6359 82b498 6360 82b4a0 SysAllocStringLen 6359->6360 6361 82b318 6359->6361 6362 82b2b0 6360->6362 6363 82ae18 6364 82ae1f 6363->6364 6366 82ae2f 6364->6366 6367 82b734 6364->6367 6368 82b738 6367->6368 6371 82b2b0 6367->6371 6369 82b318 6368->6369 6370 82b74b SysReAllocStringLen 6368->6370 6369->6364 6370->6371 6371->6364 6372 82b158 6373 82b160 6372->6373 6375 82b182 6373->6375 6376 82b208 6373->6376 6377 82b214 6376->6377 6378 82b21c RtlExitUserThread 6376->6378 6377->6378 6378->6375 6322 d31218 PostThreadMessageW 6323 d31241 6322->6323 6417 96bf2a SetThreadPriority 6418 96bf53 6417->6418 6324 d31f9e 6325 d31fa9 6324->6325 6326 d31fa4 6324->6326 6328 96be64 6326->6328 6329 96be6c 6328->6329 6331 96be8e 6328->6331 6330 96be78 ResumeThread 6329->6330 6329->6331 6330->6331 6331->6325 6419 96bd28 6420 96bd30 6419->6420 6421 96bd3a 6419->6421 6422 96be64 ResumeThread 6420->6422 6422->6421 6332 1050a4a 6333 1050a56 6332->6333 6334 1050a6f 6333->6334 6336 1050d60 6333->6336 6337 1050dab 6336->6337 6338 1050d74 6336->6338 6337->6334 6338->6337 6340 96b970 6338->6340 6341 96b976 6340->6341 6346 96ba0c 6341->6346 6343 96b98d 6344 96b998 6343->6344 6345 96be64 ResumeThread 6343->6345 6344->6337 6345->6344 6347 96ba1d 6346->6347 6348 96ba6b 6347->6348 6351 82b190 6347->6351 6355 82b18e 6347->6355 6352 82b1ad CreateThread 6351->6352 6354 82b1f5 6352->6354 6354->6348 6356 82b190 CreateThread 6355->6356 6358 82b1f5 6356->6358 6358->6348 6379 d3150c 6382 d31688 6379->6382 6384 d316b3 6382->6384 6383 d31710 6384->6383 6386 d31150 6384->6386 6387 d31176 6386->6387 6388 d311bf 6387->6388 6389 96be64 ResumeThread 6387->6389 6391 d3124c 6387->6391 6389->6388 6398 d31138 6391->6398 6394 d31138 SetServiceStatus 6395 d312a6 6394->6395 6395->6394 6396 d3132c 6395->6396 6397 96b970 3 API calls 6397->6395 6399 d31147 6398->6399 6400 d3114c 6398->6400 6402 d31034 6399->6402 6400->6397 6403 d31060 SetServiceStatus 6402->6403 6405 d310f0 6403->6405 6410 d5073a 6411 d50690 6410->6411 6412 d50766 SleepEx 6411->6412 6413 d507bc 6411->6413 6412->6411

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 829a60-829a68 1 829a73-829a76 0->1 2 829a6a-829a71 0->2 4 829a78-829a7d 1->4 5 829a7f 1->5 2->1 3 829ad4-829add call 829b28 2->3 8 829ae2-829ae7 3->8 7 829a81-829a9f 4->7 5->7 9 829aa1-829aa8 7->9 10 829aaa-829ac2 7->10 11 829ae9 8->11 12 829aef-829af0 8->12 9->8 13 829ac4-829acb Sleep 10->13 14 829acd-829ad2 10->14 11->12 13->8 14->8
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNELBASE(00000000,?,00829B19,?,?,00829D58), ref: 00829AC6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID: gfff$gfff
                                                                                                                    • API String ID: 3472027048-3084402119
                                                                                                                    • Opcode ID: 5e46165e4fe12a0cb0b97d71fc4b3e4d7555812954f0bc1330c04744e8927540
                                                                                                                    • Instruction ID: 60ad1bc2e8a3ee4eb6ff2259cacf6486ee8ca3400a22b25dabdd0aef9bd45b87
                                                                                                                    • Opcode Fuzzy Hash: 5e46165e4fe12a0cb0b97d71fc4b3e4d7555812954f0bc1330c04744e8927540
                                                                                                                    • Instruction Fuzzy Hash: 8F01A2717447348BDB6CA93DB88176C6282F781311FA48235E983CE2C9EAB198C08247

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 17 884f3c-884f5d 19 884f7f-884fee RegOpenKeyExW RegQueryValueExW 17->19 20 884f5f-884f75 17->20 20->19
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,008850E0,00000000,00020019,?), ref: 00884FB7
                                                                                                                    • RegQueryValueExW.KERNELBASE(?,0088513C,00000000,00000000,00000000,?,00000000,008850CE), ref: 00884FE5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000883000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00883000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_883000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: OpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4153817207-0
                                                                                                                    • Opcode ID: 33e0d47f5b9e3fe3ef6c0649d0d184844c5c58ca2d07d596a5e563d1a97b3830
                                                                                                                    • Instruction ID: c1947dcf2e67bc80fc573fa35053b5e1c59c005f77e4e27a636ce61a54c3017b
                                                                                                                    • Opcode Fuzzy Hash: 33e0d47f5b9e3fe3ef6c0649d0d184844c5c58ca2d07d596a5e563d1a97b3830
                                                                                                                    • Instruction Fuzzy Hash: E9114474B40B0CAFDB61EBA49D47B9A77A8FB05700F104465FE04E6281E6B49A848F91

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 22 d50658-d50688 24 d50690-d506a1 22->24 25 d506d6-d506df call d50624 24->25 26 d506a3-d506ab 24->26 32 d50756-d5075a 25->32 33 d506e1-d506ea call d50624 25->33 27 d506bd-d506c6 call d50624 26->27 27->25 34 d506c8-d506d4 27->34 35 d5075c-d50764 32->35 36 d5079a-d507a4 call d507e4 32->36 33->32 44 d506ec-d506f6 33->44 34->25 39 d506ad-d506b9 34->39 40 d50776-d5077f call d50624 35->40 45 d507a6-d507ad 36->45 46 d507af-d507b6 36->46 39->27 40->36 52 d50781-d5078d 40->52 44->32 49 d506f8-d50702 44->49 45->46 50 d50791-d50793 45->50 46->24 51 d507bc-d507c4 46->51 53 d50715-d50730 49->53 54 d50704-d5070b 49->54 50->36 55 d507c9-d507d9 51->55 56 d50766-d50772 SleepEx 52->56 57 d5078f 52->57 53->32 58 d50713 54->58 56->40 57->36 58->32
                                                                                                                    APIs
                                                                                                                    • SleepEx.KERNELBASE(0000000A,00000000), ref: 00D5076A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D50000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D50000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d50000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3472027048-0
                                                                                                                    • Opcode ID: 267bbe90e89e13053b06a0291a43bae39e72396d9c801c73dd0803c6370e9e86
                                                                                                                    • Instruction ID: 0217ad070c4411a11c55310d643adc33caafbfaafb2ef944a22bb8734e794cc5
                                                                                                                    • Opcode Fuzzy Hash: 267bbe90e89e13053b06a0291a43bae39e72396d9c801c73dd0803c6370e9e86
                                                                                                                    • Instruction Fuzzy Hash: E1413830A04204EFDF14DB68C981E9ABBE5EF89315F2944D4FC05AB292D770AE49DB64

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 63 d31034-d3106a 65 d31073-d3107a 63->65 66 d3106c-d31071 63->66 67 d3107d-d31089 65->67 66->67 69 d3108b-d31095 67->69 70 d31098 67->70 69->70 71 d310a7-d310a9 70->71 72 d3109a-d310a0 70->72 74 d310ac-d310d3 71->74 72->71 73 d310a2-d310a5 72->73 73->74 75 d310d5 74->75 76 d310dc-d310ee SetServiceStatus 74->76 75->76 77 d31112-d3111a 76->77 78 d310f0-d3110b 76->78 79 d3111f-d3112f 77->79 78->77
                                                                                                                    APIs
                                                                                                                    • SetServiceStatus.SECHOST(?,?), ref: 00D310E7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D31000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D31000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d31000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ServiceStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3969395364-0
                                                                                                                    • Opcode ID: c2da97425e5d4a6e859dd203e876b4c7d6b5812b30a902282db7e4e5de20f727
                                                                                                                    • Instruction ID: 7f571d53b87ee46ce7d6405a80d984ac12a3affc51d297001b85ebcc1ea98ec6
                                                                                                                    • Opcode Fuzzy Hash: c2da97425e5d4a6e859dd203e876b4c7d6b5812b30a902282db7e4e5de20f727
                                                                                                                    • Instruction Fuzzy Hash: 4A219A74E0428A8FDB14DF79C8917ADBBF5EB4D300F188475E808EA246E73899448B75

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 85 82b190-82b1ab 86 82b1bb-82b1c9 85->86 87 82b1ad-82b1b9 85->87 90 82b1cc-82b1f3 CreateThread 86->90 87->90 91 82b1f5 90->91 92 82b1fc-82b204 90->92 91->92
                                                                                                                    APIs
                                                                                                                    • CreateThread.KERNEL32(?,?,Function_00002158,00000000,?,?), ref: 0082B1EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2422867632-0
                                                                                                                    • Opcode ID: ad9ec824ea67045439c33b53b5af0cb0b7457e0cef7ff46f7ae1e336fcf108e2
                                                                                                                    • Instruction ID: 1d82f72126a3d9a07934de2bab667edd3aa7072e431891da0ef7563df1143958
                                                                                                                    • Opcode Fuzzy Hash: ad9ec824ea67045439c33b53b5af0cb0b7457e0cef7ff46f7ae1e336fcf108e2
                                                                                                                    • Instruction Fuzzy Hash: DD016272705264AFCB11DB9DA884B8AB7ECFB59320F148166F508DB381DB70DD5087A5

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 93 82b18e-82b1ab 95 82b1bb-82b1c9 93->95 96 82b1ad-82b1b9 93->96 99 82b1cc-82b1f3 CreateThread 95->99 96->99 100 82b1f5 99->100 101 82b1fc-82b204 99->101 100->101
                                                                                                                    APIs
                                                                                                                    • CreateThread.KERNEL32(?,?,Function_00002158,00000000,?,?), ref: 0082B1EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2422867632-0
                                                                                                                    • Opcode ID: 8bd15322f39ef3fa972de42f2238b17344d99c89ddbc27d5d4883d90d5d7730e
                                                                                                                    • Instruction ID: 1c583c465c5c26946d425eb3259452eb88400accc3c204694e87e2736465552e
                                                                                                                    • Opcode Fuzzy Hash: 8bd15322f39ef3fa972de42f2238b17344d99c89ddbc27d5d4883d90d5d7730e
                                                                                                                    • Instruction Fuzzy Hash: 4DF04F72B05224AFD711CAADAC84A9AB7ECFB59360F144126F908E7380DB70ED5087A4

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 102 96be64-96be6a 103 96bea7-96beb9 102->103 104 96be6c-96be70 102->104 108 96bebe-96bebf 103->108 104->103 105 96be72-96be76 104->105 105->103 106 96be78-96be8c ResumeThread 105->106 106->108 109 96be8e-96bea6 106->109
                                                                                                                    APIs
                                                                                                                    • ResumeThread.KERNELBASE(?), ref: 0096BE84
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.000000000096B000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0096B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_96b000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ResumeThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 947044025-0
                                                                                                                    • Opcode ID: eeed031f8d40bec7c316d0806381ed29ef85c229929ed22f000d502378a0d1ae
                                                                                                                    • Instruction ID: 44968cae644dbcaac8c30fd0f9c0033d610c0951c97dc0ea5094731894273291
                                                                                                                    • Opcode Fuzzy Hash: eeed031f8d40bec7c316d0806381ed29ef85c229929ed22f000d502378a0d1ae
                                                                                                                    • Instruction Fuzzy Hash: C4F082601041809BDB25EBB8D4D17563BD9AF84314F08808AE444CF35BD723ECC4D763

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 112 82b734-82b736 113 82b75b 112->113 114 82b738-82b73a 112->114 115 82b740-82b745 114->115 116 82b318-82b31c 114->116 115->116 119 82b74b-82b755 SysReAllocStringLen 115->119 117 82b31e-82b32b 116->117 118 82b32c 116->118 117->118 119->113 120 82b2b0-82b2ba 119->120 124 82b2cc 120->124 125 82b2bc-82b2c6 120->125 125->120 125->124
                                                                                                                    APIs
                                                                                                                    • SysReAllocStringLen.OLEAUT32(?,?,?,0082AE29), ref: 0082B74E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2525500382-0
                                                                                                                    • Opcode ID: 42b17b69e7c34a539a1e38d6f70af66ede4161eb92af256fead160cf4ab1be79
                                                                                                                    • Instruction ID: baad1a2a4b2992ef45846da25a55e5a529159332b5bdee2dbd08ac7f86eae9d3
                                                                                                                    • Opcode Fuzzy Hash: 42b17b69e7c34a539a1e38d6f70af66ede4161eb92af256fead160cf4ab1be79
                                                                                                                    • Instruction Fuzzy Hash: D8E012F45427219EEA14DA19B815B3B73ADFBD1302FA8C59CA801DB244DB35ACC0D779

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 127 96bf2a-96bf4e SetThreadPriority call 96bd10 129 96bf53-96bf55 127->129
                                                                                                                    APIs
                                                                                                                    • SetThreadPriority.KERNELBASE(?), ref: 0096BF41
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.000000000096B000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0096B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_96b000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PriorityThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2383925036-0
                                                                                                                    • Opcode ID: 736494e5836eb4f3d626e144a883415608e369882c642978f1bc1cc7b2f2e457
                                                                                                                    • Instruction ID: 5a633fdf9efcc2bbd36e665c30cfd39bbbb8d6b015b536245136d7a7f540227a
                                                                                                                    • Opcode Fuzzy Hash: 736494e5836eb4f3d626e144a883415608e369882c642978f1bc1cc7b2f2e457
                                                                                                                    • Instruction Fuzzy Hash: 5ED0A9B27004281F8228E5ADA880DAA62CDDBCC2567208423F008C3210E625CC5043A0

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 130 d31218-d3123f PostThreadMessageW 131 d31241 130->131 132 d31246-d31248 130->132 131->132
                                                                                                                    APIs
                                                                                                                    • PostThreadMessageW.USER32(?,00000401,?,00000000), ref: 00D31230
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D31000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D31000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d31000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessagePostThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1836367815-0
                                                                                                                    • Opcode ID: c40ac58bcbe592e67436c6c1658b3d70315458617669241c6911774ac0858f01
                                                                                                                    • Instruction ID: 0cf3d4fac840037bfd9e1c0d6276982dd058f17945f8f819bf586d44c561c44e
                                                                                                                    • Opcode Fuzzy Hash: c40ac58bcbe592e67436c6c1658b3d70315458617669241c6911774ac0858f01
                                                                                                                    • Instruction Fuzzy Hash: F3D05EB52002006FF71096A9D8CAF2177DCEB85714F4840A0FB0C8F293C5B5AC008374

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 133 82b498-82b49a 134 82b4a0-82b4ab SysAllocStringLen 133->134 135 82b318-82b31c 133->135 138 82b2b0-82b2ba 134->138 139 82b4b1-82b4ba 134->139 136 82b31e-82b32b 135->136 137 82b32c 135->137 136->137 144 82b2cc 138->144 145 82b2bc-82b2c6 138->145 145->138 145->144
                                                                                                                    APIs
                                                                                                                    • SysAllocStringLen.OLEAUT32(?,00000000,?,0082B5F3), ref: 0082B4A3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2525500382-0
                                                                                                                    • Opcode ID: 6a9c2ce9cc4a789dd8b7f56db604f782f191c8b2ddce53fb5c404305489610a8
                                                                                                                    • Instruction ID: ed08ec873dd2c689081d8b03cb2751c8bb8877ac4df624038af3130727d3a00c
                                                                                                                    • Opcode Fuzzy Hash: 6a9c2ce9cc4a789dd8b7f56db604f782f191c8b2ddce53fb5c404305489610a8
                                                                                                                    • Instruction Fuzzy Hash: 4EC08CFC18AB22ADFF093F35B905A3BA75CFD6130679000A8BD10CA102E735E8C0252A

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 147 82b208-82b212 148 82b214 147->148 149 82b21c-82b223 RtlExitUserThread 147->149 148->149
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000829000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00829000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_829000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExitThreadUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3424019298-0
                                                                                                                    • Opcode ID: 0090e549b2ea502e9a158c55c13b39a714d53e282923f423b291ac9308cf37e2
                                                                                                                    • Instruction ID: 1c88ddd71d4afb6d84062820c7a2c7d8cc4a656aa2f33e9ea150900d760fe170
                                                                                                                    • Opcode Fuzzy Hash: 0090e549b2ea502e9a158c55c13b39a714d53e282923f423b291ac9308cf37e2
                                                                                                                    • Instruction Fuzzy Hash: 1BC092B12423208BC3207AF8BEDCB1932A8F708322F946824B206CE247C7BC88C4D754

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 150 d0859c-d085ad 151 d085bf-d085f1 150->151 152 d085af-d085b5 150->152 155 d08791-d08798 151->155 152->151 156 d085f6-d08600 call d08a98 155->156 157 d0879e-d087a6 155->157 161 d08602-d08614 call d08a98 156->161 162 d0863a-d0867a 156->162 159 d087ab-d087bb 157->159 161->162 173 d08616-d0861d 161->173 168 d0867c 162->168 169 d086df-d086fd 162->169 171 d086d1-d086db call d08a98 168->171 178 d08732-d08747 169->178 179 d086dd 171->179 180 d0867e-d08691 call d09bbf 171->180 173->157 177 d08623-d08634 173->177 177->157 177->162 178->155 179->178 184 d08694-d0869c 180->184 184->171
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D08000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D08000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d08000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: IdThread (unknown)
                                                                                                                    • API String ID: 0-2043411369
                                                                                                                    • Opcode ID: 3a48e17b6b7f58792d0c0c53dd53541f5795817a75a5c0a0695d6fc4a35af167
                                                                                                                    • Instruction ID: 9ff4a0540be9aa76c27488689f25de95e4cdc5f2b7e0fb462a49337fd2875db0
                                                                                                                    • Opcode Fuzzy Hash: 3a48e17b6b7f58792d0c0c53dd53541f5795817a75a5c0a0695d6fc4a35af167
                                                                                                                    • Instruction Fuzzy Hash: 7F419C30604244EFD712CF64C955A59BBF9FB4A710BA248A0F88497AA1CB71EE14FA60

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 186 d2c710-d2c773 call d2c6f0 193 d2c7a3-d2c7cb 186->193 194 d2c775-d2c783 186->194 200 d2c7da-d2c7f5 193->200 201 d2c7cd-d2c7d0 193->201 194->193 197 d2c785-d2c78a 194->197 199 d2c78f-d2c791 197->199 202 d2c793-d2c798 199->202 203 d2c79d-d2c7a1 199->203 207 d2c7f7-d2c801 200->207 208 d2c82d-d2c834 200->208 201->200 206 d2c892-d2c89a 202->206 203->193 203->199 211 d2c89f-d2c8bc 206->211 215 d2c812-d2c825 207->215 216 d2c803-d2c80d 207->216 209 d2c851-d2c859 208->209 210 d2c836-d2c849 208->210 212 d2c85e-d2c86e 209->212 210->209 215->208 216->206
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D2C000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D2C000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d2c000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: loopback
                                                                                                                    • API String ID: 0-3546420730
                                                                                                                    • Opcode ID: cdcfb7ff48c63bde279c1c173488dab0030a12a404ac0d2c7b2a48caa65e0158
                                                                                                                    • Instruction ID: 108a04f557dcfdb67ffe60f2175407a8a12876d9e0575b684e1ba59f0c6b0a2b
                                                                                                                    • Opcode Fuzzy Hash: cdcfb7ff48c63bde279c1c173488dab0030a12a404ac0d2c7b2a48caa65e0158
                                                                                                                    • Instruction Fuzzy Hash: 68410774A14218AFDB10EF98E89199EBBF8FF58304B6485A5F804E7351D730EE40CB61

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 223 17267b0-17267d4 226 17267d9-17267e7 223->226 227 17267e9-17267ec 226->227 228 17267ee-172696d 226->228 227->228 229 17267fd-1726849 227->229 235 172684e-1726861 229->235
                                                                                                                    Strings
                                                                                                                    • TProcessMessagesThread.Execute, xrefs: 017267BE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001726000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01726000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1726000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: TProcessMessagesThread.Execute
                                                                                                                    • API String ID: 0-3632000192
                                                                                                                    • Opcode ID: 05cb5a2965fd88e86cb0110e11f16da481eed05e4aca8b011c7723c0f5669fd3
                                                                                                                    • Instruction ID: 67ba4e75830b2bcf518e26429a999604d02bfa481279cecf05d38d879117ae20
                                                                                                                    • Opcode Fuzzy Hash: 05cb5a2965fd88e86cb0110e11f16da481eed05e4aca8b011c7723c0f5669fd3
                                                                                                                    • Instruction Fuzzy Hash: 1E218CB4A04215EFD700EF68D981A89B7F5FB49724F2082A6F814DB3A1CA31ED01CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000B03000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00B03000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_b03000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 268a419b04ea64c0ae1b98bbb2200776262d13de8dfcbf84f40fe074f5cb0723
                                                                                                                    • Instruction ID: 5afd4fbc53cc9a0e36dc7b3bb77926129ded04dacfd81d0632a3eb16b72d9d91
                                                                                                                    • Opcode Fuzzy Hash: 268a419b04ea64c0ae1b98bbb2200776262d13de8dfcbf84f40fe074f5cb0723
                                                                                                                    • Instruction Fuzzy Hash: 04413D34A04244EFDB05CF68D895A9EBBF6FB49710F2185E5E815EB3A2D330AE41DB10
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001050000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01050000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1050000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 88be5ac81e385e44fdddc14599aa948386c859eb81dc23e38f498266f7a178f3
                                                                                                                    • Instruction ID: e3060038bb7d25e5bd8cff60406bc9c99ac7955a9b76c7e14a490837aae1d401
                                                                                                                    • Opcode Fuzzy Hash: 88be5ac81e385e44fdddc14599aa948386c859eb81dc23e38f498266f7a178f3
                                                                                                                    • Instruction Fuzzy Hash: 05316634604204EFE751CF68D895BAEBBF5EB4A704F2288E5F844DB652D730AE00CA21
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001050000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01050000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1050000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f430aac285a5ccdabe5e32f50a2e0dbba5933fbbf9459ee7225095d42a37ca7f
                                                                                                                    • Instruction ID: 144ed2cfb8e1fcb0c29cb929d802447c68b5052e6e66de4e04fffd208530ad8b
                                                                                                                    • Opcode Fuzzy Hash: f430aac285a5ccdabe5e32f50a2e0dbba5933fbbf9459ee7225095d42a37ca7f
                                                                                                                    • Instruction Fuzzy Hash: 4E21E238604209EFC740DF98C498D9AB7F5FF4A310B2581E5E845DB366DB31AD45CB41
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001050000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01050000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1050000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7058a1fa17ffe8d2700f38cc0b63a4703ec3b97b82ace2c99e352289de4e0244
                                                                                                                    • Instruction ID: 487df177590b2fd43f8a250ae0d44746a84b83a44dea1dbdd881b5eba54b2cd8
                                                                                                                    • Opcode Fuzzy Hash: 7058a1fa17ffe8d2700f38cc0b63a4703ec3b97b82ace2c99e352289de4e0244
                                                                                                                    • Instruction Fuzzy Hash: 34113A303406418FD7A1EB3C8545B9EBBE0AF8A340F044499F9CACB316C731A8458761
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D08000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D08000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d08000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 81948fb07ea46076df47939e4d292350c83f6c70c3d778978e75f0cd6fa9b20d
                                                                                                                    • Instruction ID: 28a5dd22544cd488a2e5819e451a60d18c0dc7f2fe87c4940cf2ff3739f10347
                                                                                                                    • Opcode Fuzzy Hash: 81948fb07ea46076df47939e4d292350c83f6c70c3d778978e75f0cd6fa9b20d
                                                                                                                    • Instruction Fuzzy Hash: 04E06D73B006641BC210E25E6C42BA67B8AEBD57B0F1C4231FA88CB381D9635C5552B6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001050000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01050000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1050000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 407f8e87e328b70812a8a888e676370b5d2b33bcedd93808cceb1308f644b176
                                                                                                                    • Instruction ID: e799d725a8af2601c1d70c4816d89f18d8682d8981a4f10e04d703b8f079e3eb
                                                                                                                    • Opcode Fuzzy Hash: 407f8e87e328b70812a8a888e676370b5d2b33bcedd93808cceb1308f644b176
                                                                                                                    • Instruction Fuzzy Hash: 3BE04F613417525AEBE0656D5DC177F45C8CB10B14F2801F9BEC6C5146C9A5CE446261
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000C9C000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00C9C000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_c9c000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 018aaf894cada2a007e0020aeeda0586ff99a2327b100c124d4c6361c912d7f7
                                                                                                                    • Instruction ID: 0809057e669ba8dd639f5762e3ea8d8d1dcb442d0fb87cd76601d16713987242
                                                                                                                    • Opcode Fuzzy Hash: 018aaf894cada2a007e0020aeeda0586ff99a2327b100c124d4c6361c912d7f7
                                                                                                                    • Instruction Fuzzy Hash: 0CB02BB120C2006D351511414C83C366259C6C0F00F10800DF001C01005D910440A472
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000C9C000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00C9C000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_c9c000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 97c63bd9a12b92049ef76acd4fa76000c439bb6dbad457a426db26e6bdf56c70
                                                                                                                    • Instruction ID: 6426017c98e53e98c3ea530d6a3301b0b6a32cb8e3f11f3d9d36a1458c58e2d3
                                                                                                                    • Opcode Fuzzy Hash: 97c63bd9a12b92049ef76acd4fa76000c439bb6dbad457a426db26e6bdf56c70
                                                                                                                    • Instruction Fuzzy Hash: 2AB09BB125D6006D751551555C87C366259D6C0F11F11851DF141C45445D955540A576
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001050000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01050000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1050000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 276477d35d940d8837fbf1af46a8442e2ab0a5388a8a43947641e8f2f6b818c4
                                                                                                                    • Instruction ID: 7b2920ddfe6f84631e7160ffd26f68e3fc5ad49f608786c8024c31f9b2b4dfa6
                                                                                                                    • Opcode Fuzzy Hash: 276477d35d940d8837fbf1af46a8442e2ab0a5388a8a43947641e8f2f6b818c4
                                                                                                                    • Instruction Fuzzy Hash: 4CC04870600204CFDB84AA68C9C9A463BF4AB4830972480A0A905CB2AAE7A0CC84DB40
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000C9C000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00C9C000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_c9c000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 0c1bbdd8e6315309bb568eeb75a21429a810a32b778de78d3f535422074f8dc3
                                                                                                                    • Instruction ID: 10a97b7537904a79f83903e3454d39f19f0c7e8420868bc1ab1201c7a7850309
                                                                                                                    • Opcode Fuzzy Hash: 0c1bbdd8e6315309bb568eeb75a21429a810a32b778de78d3f535422074f8dc3
                                                                                                                    • Instruction Fuzzy Hash: B7B0923220D7800DE62B23A428A2458BBA19D83610F1A05DEE0C08A6569E511082D692
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D08000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D08000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d08000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ece824149a976f0be7aa823cfae3d6b3b8c5d121f86fed4468d886b46952911c
                                                                                                                    • Instruction ID: 4f3cf1afa9ec0bea514cbc7b7b0d8d4315858afc08ff583551acedb0cdf694ce
                                                                                                                    • Opcode Fuzzy Hash: ece824149a976f0be7aa823cfae3d6b3b8c5d121f86fed4468d886b46952911c
                                                                                                                    • Instruction Fuzzy Hash: AEB0123200410C778F013E85DC01C597F1DAB90360B40C012F94C080219633B670A7D4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000969000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00969000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_969000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: c8c2ac574abf55ae21cbf6035824376078acdc7e53a90bdab73b1b59692627a7
                                                                                                                    • Instruction ID: dcab931c4a539a2eadd99cff47283e157d11fd23f3196920210e5ae52d992c9a
                                                                                                                    • Opcode Fuzzy Hash: c8c2ac574abf55ae21cbf6035824376078acdc7e53a90bdab73b1b59692627a7
                                                                                                                    • Instruction Fuzzy Hash: 6BB001747001158F9F80DB28C688905B7E1BF8932131583E0A409CB336DA30EC85CF81
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D08000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D08000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d08000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 478f410146413648341e8936528a27955cee7fad26bed8f5d055f4a05c08cb4c
                                                                                                                    • Instruction ID: a15d2f4b2a607d16273d958e79b877ecee0b3715d85dd5abd28ef4e8c3bd8baa
                                                                                                                    • Opcode Fuzzy Hash: 478f410146413648341e8936528a27955cee7fad26bed8f5d055f4a05c08cb4c
                                                                                                                    • Instruction Fuzzy Hash: 78A0017565905A8ECA05AB24C45AA54B3A4FA5430939580E5A0984A5629B2AA9068BA0
                                                                                                                    Strings
                                                                                                                    • font-family: Courier New, monospace;, xrefs: 00D2C940
                                                                                                                    • h1 {, xrefs: 00D2C968
                                                                                                                    • </title>, xrefs: 00D2C922
                                                                                                                    • background-color: #FFFFFF;, xrefs: 00D2C954
                                                                                                                    • font-size: 130%;, xrefs: 00D2C972
                                                                                                                    • textarea {, xrefs: 00D2C990
                                                                                                                    • display: none;, xrefs: 00D2C99A
                                                                                                                    • body {, xrefs: 00D2C936
                                                                                                                    • <head><meta http-equiv="content-type" content="text/html; charset=utf-8" /><meta name="copyright" content="TektonIT" /><meta na, xrefs: 00D2C90F
                                                                                                                    • margin: 0px 0px 0px 0px;, xrefs: 00D2C97C
                                                                                                                    • <style type="text/css">, xrefs: 00D2C92C
                                                                                                                    • font-size: 100%;, xrefs: 00D2C94A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000D2C000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00D2C000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_d2c000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: </title>$<head><meta http-equiv="content-type" content="text/html; charset=utf-8" /><meta name="copyright" content="TektonIT" /><meta na$<style type="text/css">$background-color: #FFFFFF;$body {$display: none;$font-family: Courier New, monospace;$font-size: 100%;$font-size: 130%;$h1 {$margin: 0px 0px 0px 0px;$textarea {
                                                                                                                    • API String ID: 0-3743830688
                                                                                                                    • Opcode ID: d5928497c75a4b9cee80ce7309e7fd7ea2fd073c7da92c48fbd6c885cc5ce0d5
                                                                                                                    • Instruction ID: 9ad308de2657e7805f877af1e4f0b74f2fe33cf964c4431cea659e04df5dbb54
                                                                                                                    • Opcode Fuzzy Hash: d5928497c75a4b9cee80ce7309e7fd7ea2fd073c7da92c48fbd6c885cc5ce0d5
                                                                                                                    • Instruction Fuzzy Hash: B0412C22BF9B307E8201B514BD43E4F6E729AF8F4EE2039607014B2DC7A1E66D1C4079
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000001726000.00000020.00000001.01000000.0000000D.sdmp, Offset: 01726000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_1726000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: closed_by_user$error_code$network_load$ra_session_id$show_duration_in_sec
                                                                                                                    • API String ID: 0-946321287
                                                                                                                    • Opcode ID: 5db50c99d4557846a614860f78b9525b53b10d5100c6b8097dcc9dac6f6464c8
                                                                                                                    • Instruction ID: c9c4a78467fed9dcea45425068a091b636af3d9b195b77de0a6ee01ec5ddf550
                                                                                                                    • Opcode Fuzzy Hash: 5db50c99d4557846a614860f78b9525b53b10d5100c6b8097dcc9dac6f6464c8
                                                                                                                    • Instruction Fuzzy Hash: B161C434A00219DFCB04EF98C5959DDBBB5FF49304F6045A9E801AB266DB70AE4ACF51
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000969000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00969000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_969000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: END$INHERITED$INLINE$OBJECT
                                                                                                                    • API String ID: 0-4145825852
                                                                                                                    • Opcode ID: 92f680a2844c424935099e471caf5d8d469ca1ec7779e0ec88ec9bd23badcc87
                                                                                                                    • Instruction ID: 0c2083338aee5c3d156c9864f95fb539fcff86f81b6b956c01b8376760e886b2
                                                                                                                    • Opcode Fuzzy Hash: 92f680a2844c424935099e471caf5d8d469ca1ec7779e0ec88ec9bd23badcc87
                                                                                                                    • Instruction Fuzzy Hash: 5D2150742087049BDF20FFACC48179AB7DD9F99358B208555FD868B34ACA36DC068BA1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000010.00000002.3568167846.0000000000969000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00969000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_16_2_969000_rutserv.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: END$INHERITED$INLINE$OBJECT
                                                                                                                    • API String ID: 0-4145825852
                                                                                                                    • Opcode ID: 017dfa3895f0f5c99a68f3f3c636fb586fd992c804d7ef0cef4eb681b3d58128
                                                                                                                    • Instruction ID: 429e6070dcd72cc04446a3d6c796d9d5c8af1ea07801c25da70e9b9e03a97536
                                                                                                                    • Opcode Fuzzy Hash: 017dfa3895f0f5c99a68f3f3c636fb586fd992c804d7ef0cef4eb681b3d58128
                                                                                                                    • Instruction Fuzzy Hash: BA1151742083048FDF20EFACC88179AB7D9DF99398B208555FC859B35BCA36DC068B61

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:5.5%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:0%
                                                                                                                    Total number of Nodes:32
                                                                                                                    Total number of Limit Nodes:2
                                                                                                                    execution_graph 2343 5c383c 2344 5c3855 2343->2344 2345 5c3936 2344->2345 2346 5c392e DispatchMessageW 2344->2346 2346->2345 2373 5c3bde 2374 5c3be0 2373->2374 2375 5c3ce1 2374->2375 2376 5c3968 DispatchMessageW 2374->2376 2375->2375 2376->2374 2347 b4b6c0 CreateFileW 2348 b4b6fb 2347->2348 2349 b4b70c 2347->2349 2350 b4b74e CloseHandle 2349->2350 2350->2348 2351 b4b75f 2352 b4b74e CloseHandle 2351->2352 2353 b4b761 2352->2353 2354 5c34a0 2355 5c34b4 2354->2355 2356 5c34c8 SetWindowTextW 2355->2356 2357 5c34d8 2355->2357 2356->2357 2358 5c3be0 2361 5c3c0c 2358->2361 2359 5c3ce1 2361->2359 2362 5c3968 2361->2362 2365 5c383c 2362->2365 2364 5c3977 2364->2361 2366 5c3855 2365->2366 2367 5c3936 2366->2367 2368 5c392e DispatchMessageW 2366->2368 2367->2364 2368->2367 2369 5c3950 2370 5c3956 2369->2370 2371 5c383c DispatchMessageW 2370->2371 2372 5c3963 2370->2372 2371->2370

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(\\.\PIPE\RManFUSServerNotify32,40000000,00000003,00000000,00000003,00000000,00000000,00000000,00B4B75A), ref: 00B4B6ED
                                                                                                                    • CloseHandle.KERNELBASE(000000FF,00B4B761), ref: 00B4B752
                                                                                                                    Strings
                                                                                                                    • Error - CreateFile, xrefs: 00B4B6FB
                                                                                                                    • \\.\PIPE\RManFUSServerNotify32, xrefs: 00B4B6E8
                                                                                                                    • Error - NotifyServer - WriteFile, xrefs: 00B4B737
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.0000000000B4B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B4B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_b4b000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateFileHandle
                                                                                                                    • String ID: Error - CreateFile$Error - NotifyServer - WriteFile$\\.\PIPE\RManFUSServerNotify32
                                                                                                                    • API String ID: 3498533004-2744967546
                                                                                                                    • Opcode ID: b3f7d2bed66b01a65399847740f699a82a4550f46e341dc18450e96e9cab9e73
                                                                                                                    • Instruction ID: 35e9c7c0a8f03074e4b2906bbca76205c68e74b8aa5dec62024666168f50dd4a
                                                                                                                    • Opcode Fuzzy Hash: b3f7d2bed66b01a65399847740f699a82a4550f46e341dc18450e96e9cab9e73
                                                                                                                    • Instruction Fuzzy Hash: A9113C75A40304BEDB11EBA89C42F59B7E8EB89720F2045A1FB10DB6D0D7709F00AB55

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 31 5c383c-5c3857 33 5c385d-5c3861 31->33 34 5c3945-5c394c 31->34 35 5c3871 33->35 36 5c3863-5c386b 33->36 37 5c3873-5c387c 35->37 36->35 41 5c386d-5c386f 36->41 39 5c387e-5c3892 37->39 40 5c3894-5c38a7 37->40 44 5c38a8-5c38aa 39->44 40->44 41->37 44->34 45 5c38b0-5c38b6 44->45 46 5c38bc-5c38c8 45->46 47 5c393e 45->47 48 5c38da-5c38e5 46->48 49 5c38ca-5c38ce 46->49 47->34 48->34 51 5c38e7-5c38f2 call 5c36d8 48->51 49->48 51->34 54 5c38f4-5c38f8 51->54 54->34 55 5c38fa-5c3905 call 5c3590 54->55 55->34 58 5c3907-5c3912 call 5c35e0 55->58 58->34 61 5c3914-5c391f call 5c3548 58->61 61->34 64 5c3921-5c392c 61->64 66 5c392e-5c3934 DispatchMessageW 64->66 67 5c3936-5c393c 64->67 66->34 67->34
                                                                                                                    APIs
                                                                                                                    • DispatchMessageW.USER32(?,?,?,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000), ref: 005C392F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.00000000005C3000.00000020.00000001.01000000.0000000B.sdmp, Offset: 005C3000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_5c3000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DispatchMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2061451462-0
                                                                                                                    • Opcode ID: f8689f47a30c8dc3a81985e1a6c86b74fb7905ddf96155da81c26318c978e409
                                                                                                                    • Instruction ID: 620982250ba2d4fb344b721b10e6d7a2555125cf86b53d717ea7468b601bbafd
                                                                                                                    • Opcode Fuzzy Hash: f8689f47a30c8dc3a81985e1a6c86b74fb7905ddf96155da81c26318c978e409
                                                                                                                    • Instruction Fuzzy Hash: 6321F8303443482DEB312DE91C06FBE9E95AF93F54F14C41DF5819B182DAF59E464222

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 69 5c34a0-5c34b4 71 5c34f9-5c34fc 69->71 72 5c34b6-5c34bd 69->72 73 5c34ec-5c34f2 72->73 74 5c34bf-5c34c6 72->74 73->71 75 5c34d8-5c34e6 74->75 76 5c34c8-5c34d6 SetWindowTextW 74->76 75->73 76->73
                                                                                                                    APIs
                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 005C34D1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.00000000005C3000.00000020.00000001.01000000.0000000B.sdmp, Offset: 005C3000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_5c3000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: TextWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 530164218-0
                                                                                                                    • Opcode ID: 6d2c2957dbb299073f95a2d6050d4ab237cf5d545e63552985fa721db800645d
                                                                                                                    • Instruction ID: 4675c5ed0c6662d926f105ec269df623bfca67809672c503009d219b72a780ae
                                                                                                                    • Opcode Fuzzy Hash: 6d2c2957dbb299073f95a2d6050d4ab237cf5d545e63552985fa721db800645d
                                                                                                                    • Instruction Fuzzy Hash: B5F0A0343001241FDF1BAA9884C9FEA6AD86F89704F0C80BAFE088F247C7659E468271

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 94 b4b75f CloseHandle 96 b4b761-b4b764 94->96
                                                                                                                    APIs
                                                                                                                    • CloseHandle.KERNELBASE(000000FF,00B4B761), ref: 00B4B752
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.0000000000B4B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B4B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_b4b000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2962429428-0
                                                                                                                    • Opcode ID: 236c79e1a1763148c4404337020ceded8e6837527dbd39c958730d13fa1e11c0
                                                                                                                    • Instruction ID: b748c4baf5b706e7b631854199a22828b2038bf357279aa4ade7ad3fa18c9b9c
                                                                                                                    • Opcode Fuzzy Hash: 236c79e1a1763148c4404337020ceded8e6837527dbd39c958730d13fa1e11c0
                                                                                                                    • Instruction Fuzzy Hash: A9A00475544515FDC555D7D45555C5D7354554D3557341C41F303D5101C734DF407530

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 169 3191e0-3191ee 171 3191f0-3191fa 169->171 172 319203-319205 171->172 173 3191fc 171->173 172->171 174 319207-319211 call 319a20 172->174 175 319201 173->175 175->172
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.0000000000319000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00319000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_319000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 584daae42aa3a8119b8123d979331827b921ac600ba65a586dc44f520e9e3eee
                                                                                                                    • Instruction ID: 41d23be1322d52a0868b9cd7a264df6e5807f33eeb9e234906017101327d8485
                                                                                                                    • Opcode Fuzzy Hash: 584daae42aa3a8119b8123d979331827b921ac600ba65a586dc44f520e9e3eee
                                                                                                                    • Instruction Fuzzy Hash: 65E0C236B101350B9726A96D589028BA3D59EEC2A031A543AA840DB302C630DC4583D0

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 186 76bd74-76bd7c 188 76bd56-76bd5b 186->188
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.000000000076B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_76b000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7fb11c36ab23ad4d15190675ed53aa7b4d97d2fe0df9f2fb818686b393914b57
                                                                                                                    • Instruction ID: 7c7bddd266dd2f61565ef78fe12bda201fdafdc020b1838089280dcf745bc3f0
                                                                                                                    • Opcode Fuzzy Hash: 7fb11c36ab23ad4d15190675ed53aa7b4d97d2fe0df9f2fb818686b393914b57
                                                                                                                    • Instruction Fuzzy Hash: 7CB092A165C2107D651B6210AC93C3A52A8DAC2B52F2C816FB842CD081AF811884A0BA

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 183 76bd5c-76bd64 184 76bd4c 183->184 185 76bd56-76bd5b 184->185
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000011.00000002.3568167016.000000000076B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076B000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_17_2_76b000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: e7cc7ae7104053b8db2f81845152644b615a1410ba058660ce3891c70facfb1f
                                                                                                                    • Instruction ID: c938337df8f647a40f16cf713abb79e90a16511359dd095d6cb733c8dacad2ce
                                                                                                                    • Opcode Fuzzy Hash: e7cc7ae7104053b8db2f81845152644b615a1410ba058660ce3891c70facfb1f
                                                                                                                    • Instruction Fuzzy Hash: 71B092A164C2107D651B6210AD93C7A52A8CAC2B12F2C826EB842CD081AF811885A0BA

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:8.8%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:0%
                                                                                                                    Total number of Nodes:23
                                                                                                                    Total number of Limit Nodes:1
                                                                                                                    execution_graph 1418 7f5e68 1419 7f5e7a CreateFileW 1418->1419 1420 7f5eaa 1419->1420 1421 31aec8 1422 31aed0 1421->1422 1423 31aef2 1422->1423 1425 31af78 1422->1425 1426 31af84 1425->1426 1427 31af8c RtlExitUserThread 1425->1427 1426->1427 1427->1423 1428 453ce8 1429 453cee 1428->1429 1432 453d20 1429->1432 1433 453d26 1432->1433 1436 453dbc 1433->1436 1435 453d05 1437 453dcd 1436->1437 1438 453e1b 1437->1438 1441 31aefe 1437->1441 1445 31af00 1437->1445 1442 31af00 CreateThread 1441->1442 1444 31af65 1442->1444 1444->1438 1446 31af1d CreateThread 1445->1446 1448 31af65 1446->1448 1448->1438

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 7f5e68-7f5ea8 CreateFileW 2 7f5eaa-7f5eaf 0->2 3 7f5eb1-7f5ec5 0->3 6 7f5f21-7f5f24 2->6 5 7f5eca-7f5ee2 3->5 8 7f5ee4-7f5ee8 5->8 9 7f5ef3 5->9 8->9 10 7f5eea-7f5eed 8->10 9->6 10->9
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(007F5F28,C0000000,00000003,00000000,00000003,00000000,00000000,00000000,007F5F1A), ref: 007F5E9C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.00000000007F5000.00000020.00000001.01000000.0000000B.sdmp, Offset: 007F5000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_7f5000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: bd96df63b652ded210e1d01aab23eb90a5149574e7d28d4fe70428b7ec477f4c
                                                                                                                    • Instruction ID: 296ba72616c47601f910212cd80c4d89c37312bbcf38f87d91223207811eff49
                                                                                                                    • Opcode Fuzzy Hash: bd96df63b652ded210e1d01aab23eb90a5149574e7d28d4fe70428b7ec477f4c
                                                                                                                    • Instruction Fuzzy Hash: BB11E570644B08FFE7228BA4DC16F687BF4E709B20F610591F710AA7D0DB791A40C615

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 11 31af00-31af1b 12 31af2b-31af39 11->12 13 31af1d-31af29 11->13 16 31af3c-31af63 CreateThread 12->16 13->16 17 31af65 16->17 18 31af6c-31af74 16->18 17->18
                                                                                                                    APIs
                                                                                                                    • CreateThread.KERNEL32(?,?,Function_00000EC8,00000000,?,?), ref: 0031AF5A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.000000000031A000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0031A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_31a000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2422867632-0
                                                                                                                    • Opcode ID: 06a50a69973165c6ba64d981f6e8bfa54323956f95d7a6281c1ad13008d63f54
                                                                                                                    • Instruction ID: 4731b722f528ae86fa2ded49f2c1b0f6932faa5e22691cc22aeaf9b1b6288505
                                                                                                                    • Opcode Fuzzy Hash: 06a50a69973165c6ba64d981f6e8bfa54323956f95d7a6281c1ad13008d63f54
                                                                                                                    • Instruction Fuzzy Hash: 60018472705614AFC715DB9DAC81ADAB7EC9B4C361F108026F508DB381DA70DD418765

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 19 31aefe-31af1b 21 31af2b-31af39 19->21 22 31af1d-31af29 19->22 25 31af3c-31af63 CreateThread 21->25 22->25 26 31af65 25->26 27 31af6c-31af74 25->27 26->27
                                                                                                                    APIs
                                                                                                                    • CreateThread.KERNEL32(?,?,Function_00000EC8,00000000,?,?), ref: 0031AF5A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.000000000031A000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0031A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_31a000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2422867632-0
                                                                                                                    • Opcode ID: 2f7284b9a2c486983fa26925b78a278ddaff9643db0b9e46bf6706d3ed215107
                                                                                                                    • Instruction ID: 47a278032053d935068d2f31321e92c89ac3a06be8b0f5aa7196d97f2394016b
                                                                                                                    • Opcode Fuzzy Hash: 2f7284b9a2c486983fa26925b78a278ddaff9643db0b9e46bf6706d3ed215107
                                                                                                                    • Instruction Fuzzy Hash: 1AF0C872B05514AFC715CB9DAC80ADAB7ECDB4C361F104026F908D7380DA71DD81C7A4

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 28 31af78-31af82 29 31af84 28->29 30 31af8c-31af93 RtlExitUserThread 28->30 29->30
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.000000000031A000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0031A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_31a000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExitThreadUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3424019298-0
                                                                                                                    • Opcode ID: 0e0ba4a0fe07b74ab09dbbc86052f9f56d672ac974787fb81935fa6467183025
                                                                                                                    • Instruction ID: 0b87f5b3d4edd8e921c30d805d672a1557fb40f2b634a85a40dd1dab4637f6aa
                                                                                                                    • Opcode Fuzzy Hash: 0e0ba4a0fe07b74ab09dbbc86052f9f56d672ac974787fb81935fa6467183025
                                                                                                                    • Instruction Fuzzy Hash: 60C09BB1201B0087C32527749CCC7597758774D302F041824F10797162CB7C44D5C610

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 31 453dbc-453dcb 32 453dd5-453dfe 31->32 33 453dcd 31->33 35 453e06-453e08 32->35 36 453e00-453e04 32->36 33->32 38 453e0c-453e13 35->38 36->35 37 453e0a 36->37 37->38 39 453e15-453e19 38->39 40 453e8f-453e9c 38->40 41 453e39-453e47 39->41 42 453e1b-453e37 39->42 48 453e9f-453ea7 40->48 58 453e49 call 31af00 41->58 59 453e49 call 31aefe 41->59 46 453e51-453e55 42->46 45 453e4e 45->46 46->48 49 453e57-453e8d 46->49 50 453eac-453ebc 48->50 49->48 58->45 59->45
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000453000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00453000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_453000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: f9e5861e705039443da4c8859b5ae45f1a5248a41d08329e40dcbad131c13c8b
                                                                                                                    • Instruction ID: 794664544d86fa8e7bc1064b4921b5702d9b31418052078253f4791100e13c28
                                                                                                                    • Opcode Fuzzy Hash: f9e5861e705039443da4c8859b5ae45f1a5248a41d08329e40dcbad131c13c8b
                                                                                                                    • Instruction Fuzzy Hash: AC310B709047549ED722DF75D8427EBBBE49F0D342F04CC2AE865CB682DB389648C755

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 60 453c26-453c5c 63 453c93-453cc2 call 453914 60->63 64 453c5e-453c6f 60->64 70 453cc4 63->70 71 453ccc-453cd3 63->71 66 453c74-453c7c 64->66 66->63 70->71 73 453cd4 71->73 73->73
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000453000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00453000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_453000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 21a0549f8484b5379c8e0cf8979354b4c33b8ec27383754d3bb9b87e1fb93787
                                                                                                                    • Instruction ID: 4d2854c82f2a9e7eec88a44605ced23ee0c224c01ce1c1d3ce2e57ffc783fd0c
                                                                                                                    • Opcode Fuzzy Hash: 21a0549f8484b5379c8e0cf8979354b4c33b8ec27383754d3bb9b87e1fb93787
                                                                                                                    • Instruction Fuzzy Hash: B9118E71604644EFD706CF64C915959BBF4EB0A751F6244E2FC00AB312C734AE04DA64

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 74 453c28-453c5c 76 453c93-453cc2 call 453914 74->76 77 453c5e-453c6f 74->77 83 453cc4 76->83 84 453ccc-453cd3 76->84 79 453c74-453c7c 77->79 79->76 83->84 86 453cd4 84->86 86->86
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000453000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00453000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_453000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 41783a8474670c9316c2b7c45c58607a8e87de0c711e294486be6b87ecc3fa24
                                                                                                                    • Instruction ID: 1ef452f1a5d778fe2e00f61d3d760b850710f90a9ebf61a488ec39dc9a5382a5
                                                                                                                    • Opcode Fuzzy Hash: 41783a8474670c9316c2b7c45c58607a8e87de0c711e294486be6b87ecc3fa24
                                                                                                                    • Instruction Fuzzy Hash: 7E118B71608648EFD706CF64C915959BBF8EB0A752F6248E2F800AB312C738AE04DA64

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 87 627f48-627f9b 88 627fa3-627fad 87->88 90 627fc1-627fef 88->90 91 627faf-627fbc 88->91 91->90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000627000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00627000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_627000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 03c118f18f2cbe81c46a7f8feb4622ddf06327b873c70b9af42154460e66621b
                                                                                                                    • Instruction ID: 3ef50acde58013cf9239554a70f80e6d40d7055ed99cb548ea2c5d474f57393d
                                                                                                                    • Opcode Fuzzy Hash: 03c118f18f2cbe81c46a7f8feb4622ddf06327b873c70b9af42154460e66621b
                                                                                                                    • Instruction Fuzzy Hash: 0A114934600B04EFD711CF68D955FA9BBFAEB0A700F2244E4F8049B762CB75AD54EA21

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 120 453d20-453d24 121 453d26 120->121 122 453d2e-453d41 call 453dbc 120->122 121->122 125 453d43 122->125 126 453d52-453d56 122->126 127 453d48-453d4f 125->127 127->126
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000453000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00453000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_453000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 599f5e932973f66a16ee734b73f26a54a60d76c27190859f49bffc15f9c6b975
                                                                                                                    • Instruction ID: f372d883d1935c49afcdf92cbbe51ea0960c025181ad43e49b85d7666e751d00
                                                                                                                    • Opcode Fuzzy Hash: 599f5e932973f66a16ee734b73f26a54a60d76c27190859f49bffc15f9c6b975
                                                                                                                    • Instruction Fuzzy Hash: 27D02E0270282043D116ABA90C827EA66688F45AE3F080132BC40CF3D6EA0A0E4C02EA

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 133 6278b8-6278be 134 6278c6-6278c7 133->134
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000012.00000002.3568175220.0000000000627000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00627000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_18_2_627000_rfusclient.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7f5fb9902847bde12a1817a2f9fd72b54f7da068455841462ae149435e8e5b14
                                                                                                                    • Instruction ID: 97d5680196360c482314ada5dc164a026e7f5d9e0d0e99699adef6aee88ad5c7
                                                                                                                    • Opcode Fuzzy Hash: 7f5fb9902847bde12a1817a2f9fd72b54f7da068455841462ae149435e8e5b14
                                                                                                                    • Instruction Fuzzy Hash: ABB0123200010C778F013E92FC02C4A7F1DAB50364B00C012FD0C0C022963395B4A798