Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
htkeUc1zJ0.exe

Overview

General Information

Sample name:htkeUc1zJ0.exe
renamed because original name is a hash value
Original sample name:64fbd4176cf9fb77d63173f809b2433d.exe
Analysis ID:1576844
MD5:64fbd4176cf9fb77d63173f809b2433d
SHA1:737e70ae50f2616dc445d8244d192a63d48a11bc
SHA256:80ff41fea4b4580608227df8a352de5497fc84b6bf5bca9613265cedd1005c5a
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Connects to a pastebin service (likely for C&C)
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • htkeUc1zJ0.exe (PID: 6572 cmdline: "C:\Users\user\Desktop\htkeUc1zJ0.exe" MD5: 64FBD4176CF9FB77D63173F809B2433D)
    • conhost.exe (PID: 6740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • htkeUc1zJ0.exe (PID: 5228 cmdline: C:\Users\user\Desktop\htkeUc1zJ0.exe MD5: 7D77F1110DE8074096D1993EC3061470)
      • schtasks.exe (PID: 2180 cmdline: schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 2124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 1856 cmdline: cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\1gG2smsf.xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 4924 cmdline: schtasks.exe /Query /XML /TN w3oN7Nlibd06 MD5: 48C2FE20575769DE916F48EF0676A965)
      • WerFault.exe (PID: 1608 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 3288 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 640 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 5800 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 648 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 4124 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 752 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 6792 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 728 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 180 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 768 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 4124 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1500 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 5164 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1980 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 1340 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 744 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 3744 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1960 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 6316 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 6672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • htkeUc1zJ0.exe (PID: 2364 cmdline: C:\Users\user\Desktop\htkeUc1zJ0.exe MD5: 7D77F1110DE8074096D1993EC3061470)
    • conhost.exe (PID: 1196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6640 cmdline: schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1344 cmdline: cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\dO0BLEiJk.xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2476 cmdline: schtasks.exe /Query /XML /TN w3oN7Nlibd06 MD5: 48C2FE20575769DE916F48EF0676A965)
    • WerFault.exe (PID: 5088 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 712 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5348 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 956 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-17T16:41:22.890495+010028032702Potentially Bad Traffic192.168.2.449733172.232.31.180443TCP
2024-12-17T16:41:31.971678+010028032702Potentially Bad Traffic192.168.2.449731172.232.31.180443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-17T16:41:31.608968+010028245441Domain Observed Used for C2 Detected172.232.31.180443192.168.2.449731TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: htkeUc1zJ0.exeAvira: detected
Source: http://ww1.cutit.org/Avira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=27&utid=9975973299Avira URL Cloud: Label: malware
Source: htkeUc1zJ0.exeReversingLabs: Detection: 86%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: htkeUc1zJ0.exeJoe Sandbox ML: detected
Source: htkeUc1zJ0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0040AFC0 FindFirstFileA,FindClose,0_2_0040AFC0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0040AFC0 FindFirstFileA,FindClose,2_3_0040AFC0

Networking

barindex
Source: Network trafficSuricata IDS: 2824544 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Gootkit CnC) : 172.232.31.180:443 -> 192.168.2.4:49731
Source: unknownDNS query: name: pastebin.com
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00405180 InternetCheckConnectionA,2_3_00405180
Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
Source: Joe Sandbox ViewIP Address: 64.190.63.136 64.190.63.136
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49733 -> 172.232.31.180:443
Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49731 -> 172.232.31.180:443
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=27&utid=9975973299 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: ww1.cutit.org
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=27&utid=9975975645 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: ww7.cutit.org
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=27&utid=9975973299 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: ww1.cutit.org
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=27&utid=9975975645 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheConnection: Keep-AliveHost: ww7.cutit.org
Source: global trafficDNS traffic detected: DNS query: pastebin.com
Source: global trafficDNS traffic detected: DNS query: cutit.org
Source: global trafficDNS traffic detected: DNS query: ww99.cutit.org
Source: global trafficDNS traffic detected: DNS query: ww1.cutit.org
Source: global trafficDNS traffic detected: DNS query: ww7.cutit.org
Source: htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cli.re/gzBM75
Source: htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://q.gs/EVnYC
Source: Amcache.hve.12.drString found in binary or memory: http://upx.sf.net
Source: htkeUc1zJ0.exe, 00000002.00000003.1963161361.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/
Source: htkeUc1zJ0.exe, 00000002.00000003.1963161361.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=27&utid=9975973299
Source: htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.cutit.org/oxgBR
Source: htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.cutit.org/oxgBRS
Source: htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005A4000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cutit.org/oxgBR
Source: htkeUc1zJ0.exe, 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://cutit.org/oxgBRb
Source: htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060D90 NtUnmapViewOfSection,0_2_25060D90
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004501C00_2_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004501C00_2_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004501C00_2_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0044D3300_2_0044D330
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0044D3300_2_0044D330
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004383E00_2_004383E0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004054800_2_00405480
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0041F6500_2_0041F650
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0041F7300_2_0041F730
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00402C900_2_00402C90
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00402D700_2_00402D70
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00424EB00_2_00424EB0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_004501C02_3_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_004501C02_3_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_004501C02_3_004501C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0044D3302_3_0044D330
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0044D3302_3_0044D330
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_004383E02_3_004383E0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_004054802_3_00405480
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0041F6502_3_0041F650
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0041F7302_3_0041F730
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00402C902_3_00402C90
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00402D702_3_00402D70
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00424EB02_3_00424EB0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 624
Source: htkeUc1zJ0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal88.troj.winEXE@35/62@5/5
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409B40 LoadResource,0_2_00409B40
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeFile created: C:\Users\user\Desktop\htkeUc1zJ0.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2124:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5768:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1704:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1196:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2364
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5228
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6c05b874-51e5-46e8-961a-6a7d56449d26Jump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: htkeUc1zJ0.exeReversingLabs: Detection: 86%
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeFile read: C:\Users\user\Desktop\old_htkeUc1zJ0.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\htkeUc1zJ0.exe "C:\Users\user\Desktop\htkeUc1zJ0.exe"
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Users\user\Desktop\htkeUc1zJ0.exe C:\Users\user\Desktop\htkeUc1zJ0.exe
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\1gG2smsf.xml
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06
Source: unknownProcess created: C:\Users\user\Desktop\htkeUc1zJ0.exe C:\Users\user\Desktop\htkeUc1zJ0.exe
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 624
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\dO0BLEiJk.xml
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 640
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 648
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 752
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 728
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 768
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1980
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 744
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 712
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 956
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1960
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 612
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1224
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Users\user\Desktop\htkeUc1zJ0.exe C:\Users\user\Desktop\htkeUc1zJ0.exeJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /FJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\1gG2smsf.xmlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06Jump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /FJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\dO0BLEiJk.xmlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06Jump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: htkeUc1zJ0.exeStatic file information: File size 3136080 > 1048576
Source: htkeUc1zJ0.exeStatic PE information: section name: UPX2
Source: htkeUc1zJ0.exe.0.drStatic PE information: section name: UPX2
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0045C4C0 push ebp; retf 0_2_0045C5EB
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0045E95C push eax; ret 0_2_0045E95D
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409CD1 push eax; ret 0_2_00409CD3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409CA1 push eax; ret 0_2_00409CA3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409D51 push eax; ret 0_2_00409D53
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409D01 push eax; ret 0_2_00409D03
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409D31 push eax; ret 0_2_00409D33
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409DE1 push eax; ret 0_2_00409DE3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409D81 push eax; ret 0_2_00409D83
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409DB1 push eax; ret 0_2_00409DB3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409E41 push eax; ret 0_2_00409E43
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409E71 push eax; ret 0_2_00409E73
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409E11 push eax; ret 0_2_00409E13
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409ED1 push eax; ret 0_2_00409ED3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409EA1 push eax; ret 0_2_00409EA3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25065702 pushfd ; iretd 0_2_25065704
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060101 push eax; ret 0_2_25060103
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060131 push eax; ret 0_2_25060133
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060161 push eax; ret 0_2_25060163
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060191 push eax; ret 0_2_25060193
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_250601C1 push eax; ret 0_2_250601C3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_250601F1 push eax; ret 0_2_250601F3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060051 push eax; ret 0_2_25060053
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060081 push eax; ret 0_2_25060083
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_250600B1 push eax; ret 0_2_250600B3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_250600E1 push eax; ret 0_2_250600E3
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060221 push eax; ret 0_2_25060223
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060251 push eax; ret 0_2_25060253
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060281 push eax; ret 0_2_25060283
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25062856 push ebp; retf 0_2_25062869
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25064A3A pushad ; iretd 0_2_25064A3D
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeFile created: C:\Users\user\Desktop\htkeUc1zJ0.exeJump to dropped file
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeFile created: C:\Users\user\Desktop\old_htkeUc1zJ0.exe (copy)Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_0040AFC0 FindFirstFileA,FindClose,0_2_0040AFC0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_0040AFC0 FindFirstFileA,FindClose,2_3_0040AFC0
Source: Amcache.hve.12.drBinary or memory string: VMware
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.12.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.12.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.12.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.12.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.12.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.12.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.12.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.12.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.12.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.12.drBinary or memory string: vmci.sys
Source: Amcache.hve.12.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.12.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.12.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.12.drBinary or memory string: VMware20,1
Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.12.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.12.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.12.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.12.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.12.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.12.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.12.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.12.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeAPI call chain: ExitProcess graph end nodegraph_0-51360
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409FC0 mov eax, dword ptr fs:[00000030h]0_2_00409FC0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_25060400 mov eax, dword ptr fs:[00000030h]0_2_25060400
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00409FC0 mov eax, dword ptr fs:[00000030h]2_3_00409FC0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00405D10 GetProcessHeap,HeapAlloc,RtlAllocateHeap,0_2_00405D10
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409960 SetUnhandledExceptionFilter,0_2_00409960
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_00409970 SetUnhandledExceptionFilter,0_2_00409970
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00409960 SetUnhandledExceptionFilter,2_3_00409960
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 2_3_00409970 SetUnhandledExceptionFilter,2_3_00409970
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Query /XML /TN w3oN7Nlibd06Jump to behavior
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeCode function: 0_2_004026C0 cpuid 0_2_004026C0
Source: C:\Users\user\Desktop\htkeUc1zJ0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.12.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
11
Process Injection
1
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
1
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Obfuscated Files or Information
NTDS1
System Network Connections Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
File and Directory Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576844 Sample: htkeUc1zJ0.exe Startdate: 17/12/2024 Architecture: WINDOWS Score: 88 82 pastebin.com 2->82 84 ww7.cutit.org 2->84 86 5 other IPs or domains 2->86 94 Suricata IDS alerts for network traffic 2->94 96 Antivirus detection for URL or domain 2->96 98 Antivirus / Scanner detection for submitted sample 2->98 102 3 other signatures 2->102 10 htkeUc1zJ0.exe 3 2->10         started        14 htkeUc1zJ0.exe 13 2->14         started        signatures3 100 Connects to a pastebin service (likely for C&C) 82->100 process4 dnsIp5 58 C:\Users\user\...\old_htkeUc1zJ0.exe (copy), PE32 10->58 dropped 60 C:\Users\user\Desktop\htkeUc1zJ0.exe, PE32 10->60 dropped 62 C:\Users\...\htkeUc1zJ0.exe:Zone.Identifier, ASCII 10->62 dropped 104 Uses schtasks.exe or at.exe to add and modify task schedules 10->104 17 htkeUc1zJ0.exe 13 10->17         started        20 conhost.exe 10->20         started        88 cutit.org 172.232.31.180, 443, 49731, 49733 AKAMAI-ASN1EU United States 14->88 90 pastebin.com 104.20.4.235, 443, 49730, 49732 CLOUDFLARENETUS United States 14->90 92 78626.bodis.com 199.59.243.227, 49743, 80 BODIS-NJUS United States 14->92 22 WerFault.exe 14->22         started        25 WerFault.exe 14->25         started        27 cmd.exe 2 14->27         started        29 2 other processes 14->29 file6 signatures7 process8 dnsIp9 78 sedoparking.com 64.190.63.136, 49736, 80 NBS11696US United States 17->78 80 ww99.cutit.org 69.16.230.228, 49734, 49741, 80 LIQUIDWEBUS United States 17->80 31 WerFault.exe 16 17->31         started        34 WerFault.exe 16 17->34         started        36 WerFault.exe 16 17->36         started        44 11 other processes 17->44 54 C:\ProgramData\Microsoft\...\Report.wer, Unicode 22->54 dropped 56 C:\ProgramData\Microsoft\...\Report.wer, Unicode 25->56 dropped 38 conhost.exe 27->38         started        40 schtasks.exe 1 27->40         started        42 conhost.exe 29->42         started        file10 process11 file12 64 C:\ProgramData\Microsoft\...\Report.wer, Unicode 31->64 dropped 66 C:\ProgramData\Microsoft\...\Report.wer, Unicode 34->66 dropped 68 C:\ProgramData\Microsoft\...\Report.wer, Unicode 36->68 dropped 70 C:\ProgramData\Microsoft\...\Report.wer, Unicode 44->70 dropped 72 C:\ProgramData\Microsoft\...\Report.wer, Unicode 44->72 dropped 74 C:\ProgramData\Microsoft\...\Report.wer, Unicode 44->74 dropped 76 6 other malicious files 44->76 dropped 46 conhost.exe 44->46         started        48 conhost.exe 44->48         started        50 schtasks.exe 1 44->50         started        process13 process14 52 conhost.exe 46->52         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
htkeUc1zJ0.exe87%ReversingLabsWin32.Trojan.Copak
htkeUc1zJ0.exe100%AviraTR/Patched.Ren.Gen
htkeUc1zJ0.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ww99.cutit.org/oxgBR0%Avira URL Cloudsafe
http://q.gs/EVnYC0%Avira URL Cloudsafe
https://cutit.org/oxgBRb0%Avira URL Cloudsafe
https://cutit.org/oxgBR0%Avira URL Cloudsafe
http://ww99.cutit.org/oxgBRS0%Avira URL Cloudsafe
http://ww1.cutit.org/100%Avira URL Cloudmalware
http://ww1.cutit.org/oxgBR?usid=27&utid=9975973299100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
ww99.cutit.org
69.16.230.228
truefalse
    unknown
    78626.bodis.com
    199.59.243.227
    truefalse
      high
      cutit.org
      172.232.31.180
      truetrue
        unknown
        sedoparking.com
        64.190.63.136
        truefalse
          high
          pastebin.com
          104.20.4.235
          truefalse
            high
            ww7.cutit.org
            unknown
            unknowntrue
              unknown
              ww1.cutit.org
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://ww99.cutit.org/oxgBRfalse
                • Avira URL Cloud: safe
                unknown
                https://cutit.org/oxgBRtrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://cutit.org/oxgBRbhtkeUc1zJ0.exe, 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://upx.sf.netAmcache.hve.12.drfalse
                  high
                  http://ww1.cutit.org/htkeUc1zJ0.exe, 00000002.00000003.1963161361.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://pastebin.com/htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    http://ww1.cutit.org/oxgBR?usid=27&utid=9975973299htkeUc1zJ0.exe, 00000002.00000003.1963161361.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://q.gs/EVnYChtkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ww99.cutit.org/oxgBRShtkeUc1zJ0.exe, 00000002.00000003.1963049948.00000000005B0000.00000004.00000020.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000002.00000003.1963190001.00000000005B0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://cli.re/gzBM75htkeUc1zJ0.exe, htkeUc1zJ0.exe, 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmp, htkeUc1zJ0.exe, 00000009.00000003.1808278845.0000000000415000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.20.4.235
                      pastebin.comUnited States
                      13335CLOUDFLARENETUSfalse
                      64.190.63.136
                      sedoparking.comUnited States
                      11696NBS11696USfalse
                      199.59.243.227
                      78626.bodis.comUnited States
                      395082BODIS-NJUSfalse
                      69.16.230.228
                      ww99.cutit.orgUnited States
                      32244LIQUIDWEBUSfalse
                      172.232.31.180
                      cutit.orgUnited States
                      20940AKAMAI-ASN1EUtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1576844
                      Start date and time:2024-12-17 16:40:06 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 10m 42s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:49
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:htkeUc1zJ0.exe
                      renamed because original name is a hash value
                      Original Sample Name:64fbd4176cf9fb77d63173f809b2433d.exe
                      Detection:MAL
                      Classification:mal88.troj.winEXE@35/62@5/5
                      EGA Information:
                      • Successful, ratio: 50%
                      HCA Information:
                      • Successful, ratio: 91%
                      • Number of executed functions: 67
                      • Number of non-executed functions: 36
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target htkeUc1zJ0.exe, PID 5228 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: htkeUc1zJ0.exe
                      TimeTypeDescription
                      15:41:08Task SchedulerRun new task: w3oN7Nlibd06 path: C:\Users\user\Desktop\htkeUc1zJ0.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.20.4.235gabe.ps1Get hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      cr_asm_crypter.ps1Get hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      vF20HtY4a4.exeGet hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      gaber.ps1Get hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      cr_asm_crypter.ps1Get hashmaliciousUnknownBrowse
                      • pastebin.com/raw/sA04Mwk2
                      sostener.vbsGet hashmaliciousNjratBrowse
                      • pastebin.com/raw/V9y5Q5vv
                      sostener.vbsGet hashmaliciousXWormBrowse
                      • pastebin.com/raw/V9y5Q5vv
                      envifa.vbsGet hashmaliciousRemcosBrowse
                      • pastebin.com/raw/V9y5Q5vv
                      New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                      • pastebin.com/raw/NsQ5qTHr
                      64.190.63.1361iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                      • ww1.cutit.org/oxgBR?usid=26&utid=9581496142
                      8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0512-3272-9af7-07db3dd99c21
                      7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0501-483c-8aad-002891fb5a97
                      UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0450-5851-9938-0bdfa7f33a56
                      1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0450-17b0-8984-b4b272a22199
                      arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0433-44f6-9e59-dc72adbb0086
                      Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0425-1706-a2c8-02526792f211
                      WlCVLbzNph.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0426-044d-b465-1d078f2f97da
                      Bpfz752pYZ.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0413-3653-b9c7-4bbc444bdc48
                      uavINoSIQh.exeGet hashmaliciousSimda StealerBrowse
                      • ww16.vofycot.com/login.php?sub1=20241112-0408-09d4-8f1c-1de8890559b5
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      cutit.orgSecuriteInfo.com.Trojan.GenericKDZ.98125.20009.29397.exeGet hashmaliciousUnknownBrowse
                      • 64.91.240.248
                      qrxTjrTy5j.exeGet hashmaliciousUnknownBrowse
                      • 69.16.230.42
                      VIXfePT6im.exeGet hashmaliciousUnknownBrowse
                      • 69.16.230.42
                      ww99.cutit.org1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                      • 69.16.230.228
                      sedoparking.com1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                      • 64.190.63.136
                      8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      WlCVLbzNph.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      Bpfz752pYZ.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      pastebin.comc2.exeGet hashmaliciousXmrigBrowse
                      • 104.20.4.235
                      Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                      • 172.67.19.24
                      RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                      • 104.20.4.235
                      file.exeGet hashmaliciousXWormBrowse
                      • 172.67.19.24
                      main.exeGet hashmaliciousUnknownBrowse
                      • 104.20.4.235
                      CVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                      • 104.20.4.235
                      http://annavirgili.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                      • 172.67.19.24
                      http://annavirgili.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                      • 172.67.19.24
                      KrnlSetup.exeGet hashmaliciousXWormBrowse
                      • 104.20.3.235
                      Revo.Uninstaller.Pro.v5.3.4.exeGet hashmaliciousUnknownBrowse
                      • 104.20.3.235
                      78626.bodis.comhttp://ejizuj.me/Kr-JOB8gGet hashmaliciousUnknownBrowse
                      • 199.59.243.220
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      NBS11696UShttps://www.cadbury.com@nmlr.xyz/christmas-hamperGet hashmaliciousUnknownBrowse
                      • 64.190.63.222
                      1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                      • 64.190.63.136
                      236236236.elfGet hashmaliciousUnknownBrowse
                      • 64.190.63.222
                      https://t.co/eSJUUrWOcOGet hashmaliciousHTMLPhisherBrowse
                      • 216.198.79.1
                      Payroll List.exeGet hashmaliciousFormBookBrowse
                      • 64.190.63.222
                      PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                      • 64.190.63.222
                      8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                      • 64.190.63.136
                      LIQUIDWEBUS1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                      • 69.16.230.228
                      REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                      • 72.52.179.174
                      rebirth.spc.elfGet hashmaliciousMirai, OkiruBrowse
                      • 69.167.175.77
                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                      • 72.52.179.174
                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                      • 72.52.179.174
                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                      • 72.52.179.174
                      PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                      • 72.52.179.174
                      akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                      • 67.225.207.146
                      xobftuootu.elfGet hashmaliciousUnknownBrowse
                      • 67.225.254.236
                      http://editableslides.coGet hashmaliciousHTMLPhisher, TechSupportScamBrowse
                      • 67.227.216.154
                      BODIS-NJUSDHL.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      Tbconsulting Company Guidelines Employee Handbook.docxGet hashmaliciousUnknownBrowse
                      • 199.59.243.205
                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                      • 199.59.243.227
                      Payment Copy #190922-001.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      new.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      PO 1202495088.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      ACQUISITION OF A CONSERVATIVE REFRIGERATOR.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                      • 199.59.243.227
                      Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                      • 199.59.243.227
                      CLOUDFLARENETUShttps://6movies.stream/series/cobra-kai-80711/6-4/Get hashmaliciousUnknownBrowse
                      • 172.67.203.124
                      https://www.google.gr/url?url=https://pniuvlpkjqhdwff&exox=rvhqtix&eaydny=ysf&gzfds=lqrwiz&nci=qtwmzch&iccvb=yhwtsp&vtqs=avtajyu&oagvzgp=irlq&mvdoc=embwrj&yylmwei=tmn&mntt=qqcvuhkd&lkydbjfiod=izjcgyubqc&q=amp/anre6g6.j%c2%adh%c2%adhn%c2%adt%c2%addd%c2%adsm%c2%ado%c2%admcw%c2%adw%c2%adgu%c2%adno.com%e2%80%8b/99twfh3p8&gcyx=ncgobia&yfevoul=wtloixvv&hukl=qfkmtky&nlhwnbr=bwkoiopy&eqfw=bmcpntp&vlvegw=zdbpajeyq&ghrv=kcdfwrl&kyddme=myxsnvtxf&asco=mgumegd&dvvibf=hzfexefeg&osme=bdyguyp&njtjvd=bkelfwmxg&bxrb=ltpyjsv&girpat=lswjchrwc&qapj=wwwowde&vahefc=ghseyzgyf&ahaj=zfqmkuo&pfsfeu=ttucmtamu&sffs=oxaajjo&hbwhgy=mgfzglmmo&bdwl=oifsufx&befsmv=jskhtmnps&sfjy=powmsnr&zixjqp=jyttdwbmu&fzkp=hztiqjm&jmzuvc=ufyoeqgfi&zujr=jxtbdtg&plvxoh=fxumxxddw&nkin=ykbzrdh&lghzli=agvbttfta&suag=ioudcjc&zpptpx=dxacgdnox&hmfz=yueoymp&fnshpz=wgayslegy&gjtg=qcjjozv&rymask=thcxzfpca&zcgn=ywtonnx&kqrpog=kgfvcqswk&imwa=wlvocxf&ggqznt=budaflbgp&zjhr=zscgach&esrhmq=qjdngljnl&ppoz=nhwzlik&zejsqg=vnvpaymyl&dnqb=kjswpyt&kunwbg=pzauoqliz&bqlz=qabnsnu&dlfnsr=dakxdfzen&uffg=uwnswdr&ywjevz=bnvkfavcb&rrob=celdmvn&czdusr=sjfjazfqw&ipgr=exylggn&fltcvh=sdfsricvf&byfs=apntxot&javhwh=nyphchiee&owbh=haflpez&mbyvqw=pdzpxeedx&ejov=taakkyw&oylsfz=qnzuplrnz&hxrq=ovegslq&duqjcc=pjwdpyvec&uoec=pjouxrb&eiezwk=okbkttiao&knji=kcmfaqe&qmathj=vymnqrvxa&gajs=riewukz&czxhiu=uysriqpma&avwe=gssbenk&jnwgpb=iqkroelwx&sjyt=zhxfzpx&liqoqs=bbajxgpxm&dqqu=ztzooam&haagcu=gkijlwgjy&mnsq=uervedi&yckhpb=ngqrbrqpc&pkne=nwisdfz&eqsiqu=mlrhvpuavGet hashmaliciousUnknownBrowse
                      • 104.17.25.14
                      https://towergroupofcompany.com/wp-includes/blobcit.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.25.14
                      out.bin.exeGet hashmaliciousLummaCBrowse
                      • 172.67.151.119
                      https://sqcconnect.com/editor/?audio=82bbc753fb82587736ffdf0df4ddb367:525c842416fd7327ee9fe3c658ce04c498788ab4db1c9c6b3cf5182b33d6839fGet hashmaliciousUnknownBrowse
                      • 104.18.95.41
                      https://share.hsforms.com/1vdAHNnZFTymOZDp9yYmMSwsx4phGet hashmaliciousUnknownBrowse
                      • 104.16.117.116
                      http://sdgfdjfgd19sdgfghfs.z33.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
                      • 104.22.44.142
                      BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                      • 104.21.84.67
                      http://www.delinian.comGet hashmaliciousUnknownBrowse
                      • 104.17.245.203
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      37f463bf4616ecd445d4a1937da06e1967618a47ee8c5.vbsGet hashmaliciousMint StealerBrowse
                      • 172.232.31.180
                      PKO_0019868519477_PDF_#U2462#U2465#U2461#U2465#U2467#U2464#U2464#U2466.htaGet hashmaliciousMint StealerBrowse
                      • 172.232.31.180
                      BBVA S.A..vbsGet hashmaliciousRemcosBrowse
                      • 172.232.31.180
                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                      • 172.232.31.180
                      87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • 172.232.31.180
                      dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                      • 172.232.31.180
                      hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                      • 172.232.31.180
                      Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                      • 172.232.31.180
                      sEOELQpFOB.lnkGet hashmaliciousRedLineBrowse
                      • 172.232.31.180
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9977934960504329
                      Encrypted:false
                      SSDEEP:192:62LaR0dg3ppmnxjfpiN8zuiF+Z24IO8v:62LaSK54xjh9zuiF+Y4IO8v
                      MD5:24092C6D558E195D17E6F339EC652464
                      SHA1:9BE387583E40ED8A88601E41E303F77183271EEE
                      SHA-256:F9DE58F1F7DD1172F2C72C0666D72DCE4402F1A17B895449234C96DB2FCAE5EA
                      SHA-512:74EE427C321DF0F38B335DD2022E8C78B924C5683CFEEFAD2C87C19FACD084A1E92978336419E52E12A2E8E1C5C52A7ACFF0F217A2D9B9C0C80C1F2D237C6C82
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.8.0.7.9.6.3.7.5.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.a.5.4.0.9.2.4.-.e.4.f.e.-.4.5.8.5.-.a.4.e.e.-.4.0.f.d.7.e.6.0.4.1.b.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.9.a.f.f.b.4.-.d.6.9.3.-.4.d.b.6.-.b.0.f.3.-.e.6.c.6.7.1.8.0.8.a.d.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.3.c.-.0.0.0.1.-.0.0.1.4.-.8.c.f.0.-.8.a.1.7.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9983419465582798
                      Encrypted:false
                      SSDEEP:192:uoIjc2L4R0yFFlajfpi18zuiFjZ24IO8v:VMc2L4SyFFsjh1zuiFjY4IO8v
                      MD5:DEB79BC5B5CA0F1AE891BEBFEA651C20
                      SHA1:94E51E0EF59585C35B3519928C4052C247E53911
                      SHA-256:B47555AF2A89860E50AE50BE4AE4FFCC432A16893885BC0130C6F6391B8E6DDD
                      SHA-512:F54CAA6E29E0070E8A2D90B5ED35C307BF91D2F1C981213027C4766A9E801860603DDC3AB3A719652D88BDEE14CEDC180B1304A34F1C3F6F6351111BC91EDBFF
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.7.9.7.6.7.0.2.3.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.a.e.b.8.2.2.-.7.b.f.a.-.4.a.8.c.-.b.8.6.1.-.0.0.b.3.4.9.5.e.2.c.1.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.e.b.4.b.6.8.3.-.5.c.7.d.-.4.8.2.c.-.8.5.7.9.-.d.c.3.f.f.2.0.a.7.e.d.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9980423996899206
                      Encrypted:false
                      SSDEEP:96:Uv2Lej3LmnidLTsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmR:7ejc2LTR056rwjfpi18zuiFIZ24IO8v
                      MD5:5BAAAFB0C40E4ADC5C244AC9B1E22E4A
                      SHA1:D0609D68F8759C41EDEDD71F3FDC2039B997CD33
                      SHA-256:335EC681B74EEAC0B9A8D3BDD53FC839E4DA07F864A2F3C8F410C8531139FA48
                      SHA-512:EBFA23574BE29D44C903D3552663FDDCB6A628D1B956378E71F67BA6B5AD56DC691006B85247E728FD861ECFC4ED0D955FDA812A66686A72D7D95FB31F22EFF5
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.8.2.4.4.9.3.7.6.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.4.3.5.0.9.c.-.6.a.c.9.-.4.4.f.2.-.b.9.b.6.-.9.d.1.0.9.9.d.a.5.1.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.6.d.d.3.8.0.-.c.7.6.f.-.4.e.2.e.-.b.2.8.7.-.3.d.8.b.e.1.d.5.a.3.2.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9788559012526702
                      Encrypted:false
                      SSDEEP:96:j4bj3LmnidL5sohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmxjM:jqjc2L5R056rwjfpi1DzuiFIZ24IO8v
                      MD5:4033F9B20118BBE374ED330CE0BD3017
                      SHA1:9276F9ED3E09DF9BFFB2B6AAB0AF7E41A592D857
                      SHA-256:F61F52E82A850F22E2111EAA69FD1514C7983C86EEEE54BF2F21CBE0C4803EAC
                      SHA-512:2109DE657976C7DF81F586616D439F6824BEB6F2DC61718B78F698D6A08A11672F23E24E7ADFF99FA8A5DF20A35AE38C05A50EAB5EA8D750C9C528384E180116
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.8.0.6.2.6.7.3.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.2.a.9.3.1.6.-.7.0.8.0.-.4.1.9.6.-.8.c.c.1.-.3.d.6.7.1.4.4.3.b.3.4.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.e.6.e.9.5.4.-.7.9.f.1.-.4.7.a.6.-.8.8.1.5.-.0.4.b.c.c.b.7.2.5.a.2.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8063039192796307
                      Encrypted:false
                      SSDEEP:96:jiT3j3LmnidL5sohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmxZ:y3jc2L5R056rwjfp2zuiFFZ24IO8v
                      MD5:76BA786DAA1D87DC1F06791A42F1A4D5
                      SHA1:2124EE93A1993B2818677398C987523D819F25AD
                      SHA-256:395CB208340D1934720C10F9B066A167EDCE93F289E2CD90C8D89B6747155AE4
                      SHA-512:9EAFA81DB714D99D3860E018345E76253E53BDEA65CA02BFC0F3544DEAC89CA2318C35591CAFF0BF1D97A12F1EF64387028433DE57761BE36BB47B2AB4B702B4
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.0.7.8.8.1.4.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.6.f.9.3.0.2.-.f.a.6.6.-.4.c.0.c.-.9.1.c.d.-.5.5.f.a.3.0.c.7.d.e.1.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.f.1.b.e.b.a.-.c.9.d.f.-.4.2.f.6.-.a.5.0.a.-.e.f.4.6.b.a.4.b.a.c.5.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8062973471088591
                      Encrypted:false
                      SSDEEP:96:7Xsj3LmnidLOsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmxjP:7sjc2LOR056rwjfp2zuiFFZ24IO8v
                      MD5:06263E35C519A0C6464AFC1D108F14D1
                      SHA1:EDA2972F0C15C6B83A36A678C7E7D841E4922139
                      SHA-256:7D90C325B83E3475648339B28830ADD490A290CAB38104A20930284F519B6C1F
                      SHA-512:AA1EDDE20A0DDA7E76A85C954F793A0B62CAFE24854CDCC7C31ADE0764C927E8D3459F882FCF4893FE1B1E233FE70555DF01D96431F191E58CCA68FFB13C3AF7
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.2.8.4.8.3.1.9.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.4.a.0.d.9.1.b.-.5.0.9.b.-.4.f.f.3.-.9.e.2.9.-.8.b.a.e.3.9.5.2.3.7.1.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.8.a.5.8.e.e.a.-.8.0.4.5.-.4.a.8.d.-.b.a.b.0.-.4.a.7.5.8.9.7.4.d.b.7.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8130143101936602
                      Encrypted:false
                      SSDEEP:96:KfbF6ppj3LmnidLYsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHR:Kajc2LYR056rwjfpazuiFIZ24IO8v
                      MD5:C9144DA8BF8CA8189ADCDD58ADF2548F
                      SHA1:A931651FFD8806AC782E2C0BF91015199191CE35
                      SHA-256:BBE0983BC969EB640DB79C9B982C0D2535D6B167EEB268FFCCEA3F30AA60E15B
                      SHA-512:01FE0B157C1AFE45E9A49AEFD29D05FB855406DC217666EDF19FF5D40C33E202ACD2E7126FDB77866FAFA25CE9FB66FEDBD52A30D2187A6C736300572E95FEF4
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.8.5.6.4.9.3.9.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.c.c.c.1.0.5.-.3.8.d.8.-.4.b.1.8.-.9.f.6.8.-.f.8.c.c.a.e.0.c.7.1.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.1.5.d.2.d.5.-.6.4.3.9.-.4.9.0.8.-.a.0.9.f.-.b.e.3.c.e.d.5.1.1.3.1.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9978359132990824
                      Encrypted:false
                      SSDEEP:192:Wjc2LmR0dg3ppmnxjfpi18zuiFZZ24IO8v:qc2LmSK54xjh1zuiFZY4IO8v
                      MD5:AD48A4A094DF8D0C40F200A1FF976860
                      SHA1:9459EC978230A738C15064BEC86EDCDC5DE7AF7B
                      SHA-256:431301034FE7C5146BF18F0ED0247B36534B4EB7E7A99244861526592E82A642
                      SHA-512:8FE35613CF30026B6632FE6E82229258D024205B5A47B5E1E6A3EE564C1E07B8D998B320DA5F3799BB9BAC339C9AB1D02136650F3BD3A16429B184B9AB9F0603
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.8.6.9.0.6.0.1.9.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.7.a.6.b.3.8.7.-.4.8.3.6.-.4.9.d.b.-.8.c.b.5.-.e.1.9.6.1.2.2.8.c.0.c.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.a.6.c.9.9.d.-.c.5.d.a.-.4.9.4.a.-.a.3.c.5.-.7.5.c.4.b.d.e.3.a.f.7.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8063094576743787
                      Encrypted:false
                      SSDEEP:96:YI+59j3LmnidLBsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmc:fSjc2LBR056rwjfp2zuiFFZ24IO8v
                      MD5:E1117EF2A2B76591374DC4924E07D797
                      SHA1:5FE6B8CCE1ED77AA9D0820B726487F688EB119F3
                      SHA-256:97FCFC78A9A82BBA78E444591D4FDA44216EFC5F12C1E831BAEFCA9681ED0F00
                      SHA-512:96C9E0FFAF301329E4B4CF722BBE4D4674B10CE8EAEA702DEB591CC5DDE69EFDC69E912B1AEA52517E6BD3EC850EB197CD21E63EEAABFC027072B0F91F4E6644
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.5.8.2.8.8.5.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.f.2.c.e.9.3.4.-.1.6.3.7.-.4.7.f.f.-.8.1.4.4.-.6.b.5.0.6.9.3.9.d.f.1.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.e.b.c.e.e.d.6.-.7.9.4.7.-.4.7.1.3.-.9.e.d.5.-.c.7.4.a.5.a.2.6.9.a.6.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9978566034881741
                      Encrypted:false
                      SSDEEP:192:f2LT1R0dg3ppmnxjfpiN8zuiF+Z24IO8v:f2LhSK54xjh9zuiF+Y4IO8v
                      MD5:1FA5A15C4AED96C54268C3F59FDF919A
                      SHA1:8D7BED1A0C005277C5C095EC71BA3A32640519EE
                      SHA-256:C8138633E46571BAE1CB0F2A95C1228B631AC38AB173997709256E0F0454A4C3
                      SHA-512:8651B45B4DB01DFC513AA0A155483788FC457030D96E67CCB4A2AEB04E72BA9F98D25905DF933F14245667E1292B98DF780DBA7FC2CB1226CEC157088F7A8E1F
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.8.1.0.1.7.2.0.9.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.1.9.4.d.9.1.-.a.0.d.e.-.4.5.7.c.-.a.3.1.b.-.e.4.1.e.6.d.1.a.9.c.7.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.5.b.f.c.a.7.7.-.4.0.4.f.-.4.9.6.2.-.9.2.a.6.-.5.2.6.7.b.2.a.5.3.f.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.3.c.-.0.0.0.1.-.0.0.1.4.-.8.c.f.0.-.8.a.1.7.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9979274407778681
                      Encrypted:false
                      SSDEEP:192:Sjc2LER0dg3ppmnxjfpi18zuiFZZ24IO8v:Oc2LESK54xjh1zuiFZY4IO8v
                      MD5:68D7FCE690E68009C2D62B1319D22867
                      SHA1:DBA4FCA3E1912C33B71A4997E38C33419AB84B85
                      SHA-256:E00F7A7F4258D7232D7CFD5D74AC482966C370D927328D2A6399C27F44C5660C
                      SHA-512:F6631B38CA16F1CE46FE401E810237C1A11EA9DB3A472085C903AAF1F3105EC15C17F5C77F28B8924C74EADCF49E4F3D48BFB174E7ADD0746D04C382DECA8A66
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.8.6.9.7.9.0.9.1.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.6.7.d.b.f.8.-.9.3.6.5.-.4.0.4.5.-.a.8.e.7.-.b.5.3.f.6.e.b.d.e.a.1.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.f.e.4.1.1.9.5.-.b.4.b.c.-.4.e.2.2.-.8.4.d.2.-.b.f.3.d.c.b.c.f.9.9.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9977519368820817
                      Encrypted:false
                      SSDEEP:192:R7Kjc2LAR0dg3ppmnxjfpi18zuiFZZ24IO8vo:R6c2LASK54xjh1zuiFZY4IO8v
                      MD5:7CFBFCF59876B44D8062691D3FD44A90
                      SHA1:D41E7051CCFAFB6CEF3FBF86A4BB17CDC3D13E41
                      SHA-256:28855D54A8E4BC15AC090AC89B1F2F09F88F98A7F88FAC0AE3E93BACC79B013A
                      SHA-512:781794E30E624B69B7F33D428B41EB1B0FC967E111545592A9B7EED2F3AD769AE18B870892189723E80EA0E641755C7AC8916A99CC139FA836A04AFFF13F5ED8
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.8.7.0.6.9.2.2.1.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.6.9.4.8.0.2.5.-.5.a.f.9.-.4.d.6.a.-.a.e.3.e.-.a.5.3.8.4.0.9.9.6.e.e.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.c.9.b.7.9.2.-.4.9.b.2.-.4.9.c.4.-.9.8.7.e.-.8.5.2.f.1.a.6.8.8.9.3.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8060301934410549
                      Encrypted:false
                      SSDEEP:96:Vdpj3LmnidLGsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmxjP:Rjc2LGR056rwjfp2zuiFFZ24IO8v
                      MD5:AB01E617F29896AF743F253E91028884
                      SHA1:1E3F4BFA45B79000485F267ADF420F955BB87D28
                      SHA-256:02832860266BB8B4EF2E84DC4EB3B313ADDD61A99F67F460A3823A2221666226
                      SHA-512:FC3058072A6B98C9A8FD3B8465276B68068CA828D3F4565F5D2AB17C97384DEC13A140DC2F0D8F7180D598E5E31E785478AFCB92FC7178AF862A6DC6C0CD8D69
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.4.2.2.6.0.5.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.4.5.9.7.d.5.-.4.1.8.1.-.4.0.3.e.-.8.e.f.a.-.1.8.7.7.7.9.a.1.1.b.e.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.d.9.5.8.f.7.4.-.f.3.e.0.-.4.7.c.5.-.b.8.1.c.-.6.6.4.f.b.0.b.b.1.8.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8062233291110353
                      Encrypted:false
                      SSDEEP:96:FFj3LmnidLGsohM1yDfsQXIDcQnc6rCcEhcw3rb+HbHgQggeQzOqgOyjZHhmxjzb:vjc2LGR056rwjfp2zuiFFZ24IO8v
                      MD5:75091B3A6B3F555A92D882E217956183
                      SHA1:B67676F441FBD57A869D6473665F490B497AA499
                      SHA-256:988207CDA5E533D4B3096E12B9A0C2F1EBF534583F470E202D52E5F4367AD26A
                      SHA-512:58AD7061B4413B2B59E8B15AE7E9D50B3ACAE8D38032067427DFC97C185F57B0AF2D3E9F64083413220618DEE32F0C9194C96140E0938BEFC9F4B0564C594C74
                      Malicious:true
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.6.7.6.9.8.3.5.4.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.c.e.e.8.3.7.-.3.7.1.7.-.4.c.0.8.-.a.8.8.4.-.7.6.d.2.0.1.0.b.7.0.2.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.b.5.8.c.a.d.-.2.1.6.6.-.4.5.7.5.-.a.8.1.2.-.5.1.9.0.5.4.9.c.4.2.f.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.t.k.e.U.c.1.z.J.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.6.c.-.0.0.0.1.-.0.0.1.4.-.5.d.4.f.-.f.4.1.6.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.d.1.e.1.9.5.7.d.d.f.6.5.1.e.f.5.9.3.2.3.3.f.6.0.5.6.5.a.f.f.7.0.0.0.0.f.f.f.f.!.0.0.0.0.6.f.9.5.f.8.c.5.8.2.a.8.0.c.2.d.5.f.6.2.0.1.b.1.7.c.8.2.c.1.5.1.6.4.3.1.e.8.a.3.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.0.!.h.t.k.e.U.c.1.z.J.0...e.x.e.....B.o.o.t.I.d.=.4.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:11 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):46514
                      Entropy (8bit):2.064023937854866
                      Encrypted:false
                      SSDEEP:192:Y6iqbXQuMOSdeA/ebXuVKCLYLz1nygP0gbXauls/zDoR9Bx4g2n8:4q7QuDSIA6nzly4s/zsR9BCgr
                      MD5:F45BDC697367AE79EF4FF0109D925C85
                      SHA1:FAFD0D99C551BFD8BDDB052501C39376CC5258A6
                      SHA-256:A541F56ED79066601919A886080FF58D51AB6DB916C6AFA13A339C642E293A16
                      SHA-512:943D450CDE7C649EDC797107F560905E5A751F2381518D65103B91088AD76DD0E75E1B7019EDA963A9FE57567BC65A0C5AFA2E14E76DDD865CD65950627AB750
                      Malicious:false
                      Preview:MDMP..a..... .........ag....................................T....(..........T.......8...........T.......................................................................................................................eJ......h.......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8286
                      Entropy (8bit):3.6954528981751316
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpQ6Xo6YUn6rgmf1JXYZpB189b6vsfjem:R6lXJ+6Y6Yk6rgmf1JXYk6UfT
                      MD5:30F8196A3338FAF1A3C9E0DE49458709
                      SHA1:5C36977FAE2D875EDEE1E408E8FB4E3255D8CF68
                      SHA-256:976BEC4B31153F4B8E8F11B70888D8D1CEF9656E1F21DD624A932E94B49604F4
                      SHA-512:DB4F2AF62F4398EF617475DD2BC6361B0297F379A2D74B0425F347CBA1D403848EC52BB5546FAA2B584A5D906329CA6738C8E67F2D775929286576FA80DBC8F2
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.448849366186772
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsdJg77aI90fWpW8VY7SYm8M4JEgNdUFT+q8lQu36H45f+3E3Isd:uIjf3I7+O7VyJL28KHsP3Isd
                      MD5:22A075AE10D9D22B7FF7EC1D9D816757
                      SHA1:DA7FE45EC431CD169421E756336AB77AC8937D7C
                      SHA-256:5AE685996D5C94136167CD768CCFE076F539B2C445C5375089A1ADB86ABA7116
                      SHA-512:45DD6782117BC233F03EC445DDB71BAD6D091A6CE020E17B7B0754D45166148EC963241EEF56B485ECF31343C80E72A804101F646A8EADC1110F079CFFA7E335
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:44:29 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):94458
                      Entropy (8bit):2.227667369245406
                      Encrypted:false
                      SSDEEP:384:iWcA3FDSeMWHnSW4Hhj0sZIiwK9rmbCXAu9GID8R6k6MQ+iOOfT0F:iNABSe43BgUIiwK9rK6D87HQ+7ST0F
                      MD5:241467B7DEF45596FA7F368A97551FB2
                      SHA1:0352A222D90E221498B49DC2771AD67D91F32EB0
                      SHA-256:042FA79B4BEE62751F222F928B52DB71FFBEFEC52EE90F128ABEAF5212761024
                      SHA-512:EB246A66F76F219AD1B00D67C48400DBAE8DC902CC105D978D53CFFA24599A12BC79E21BACC908AE85167F9EFE5464CC75BE510A547F5C8461B7B2C4384DED87
                      Malicious:false
                      Preview:MDMP..a..... .......].ag.........................................C..........T.......8...........T...........8K...%..........t!..........`#..............................................................................eJ.......#......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8310
                      Entropy (8bit):3.6963570629433877
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpp6yN6YUg6rgmf1JXYZpBl89bkvsfCGMm:R6lXJn6I6Yz6rgmf1JXYUkUfC0
                      MD5:A679ECD285D17657D5F08B6CB9E57808
                      SHA1:E04134013F9B9C19949C436694DAE932D7066DB1
                      SHA-256:A7F6381CC2B4BEE611635BF49009CCE0FCB611A0DD477AFB067ECA800CEDDDC2
                      SHA-512:F01FED62F31B0F406BDC006667ACC6F317C23018AF870D67A932E3158E6E54455DD4303B52E6305F601B6DD0BEA377E259DD02E917A4847262486D3F7E46A3DE
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.45105849402926
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsBJg77aI90fWpW8VYrrYm8M4JEgNdUFW+q8lQu36H45f+3E3Isd:uIjfTI7+O7VbJLD8KHsP3Isd
                      MD5:A802177596BF1E2FD5467C96685FCFA3
                      SHA1:C7D04433CF6E2BD95F43B8ECAFBFCB87D437D7D3
                      SHA-256:FFE3DAAC91949E47AD805C62AEB64E94D5609E7B09FB4CF6D7F5CFCFACE68008
                      SHA-512:C178F98ACFB9FA1FD3B55327B4B1FF6DD03FB112F8B3C6DB54064A2D9F91937138FD708BD3BA5956EA91716F023EC141534972E43C5ABA7D8FF52A5CE5C83C22
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635447" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:12 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):69136
                      Entropy (8bit):2.055023982397388
                      Encrypted:false
                      SSDEEP:384:GCj8Yb/pSIHUNfKzlLwsrGBcVOZy5Q1nKM7Un:GC4YjpS+UNSdwUIIQC
                      MD5:B4EFAED10D422BAA7C35AF89B9022987
                      SHA1:83FEDF8432242042874BD47751A720A0D15C6548
                      SHA-256:B18B518AE90FE187F23EAAF6949C51CFDCDF9CCDA76061937F98B69721775100
                      SHA-512:3EE99A80003E468F4B0F8CA700CC2A0E3997828E570F3A9D036497FD1BD31DADF54320A450FD12B30E0469066D75049AB4EC9B34764643EB70E49823C5B76B75
                      Malicious:false
                      Preview:MDMP..a..... .........ag............T...............\............1..........T.......8...........T...........................t...........`...............................................................................eJ..............GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8284
                      Entropy (8bit):3.6960113651192
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpE6+uO6YUS96rgmf1JXYZpBG89bIvsfzJ4m:R6lXJa6+uO6Y16rgmf1JXYZIUfzj
                      MD5:F8F8C91896B44472D6AB3CC05313EA18
                      SHA1:966FF790E5F922E4EF1D2D8EB19627DA139FDA79
                      SHA-256:F09429467D42DEB68E34F67CA5C1150915329DE875FC1E7AE2834EEC9C518E98
                      SHA-512:C021B6474BAA810960334113BC57D1B650315E984AAA5E03866C5FADAD83B3B7DD86B5B194707F05C94F4C8F005899F2E5332F3A1E3E95441CB230C558E77E4E
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.450249040894526
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsdJg77aI90fWpW8VY7sYm8M4JEgNdUFEm+q8lQu36H45f+3E3Isd:uIjf3I7+O7V8JL/m8KHsP3Isd
                      MD5:3C30CB3C822010A5DBF29AF315268948
                      SHA1:7C21600CE7241AC32E2063391152C406F522C0B8
                      SHA-256:A89978899FFEB4F254F59A79159DE7CD566CAE89BC7FE411EDDE37A9E74634F9
                      SHA-512:1784E3F4363E66E96AD06E4658B2CDC9F9FCC68773C57E3C8175B15B29E2C2DDD6599AFD403DA5D73F1255F6D0B48D297ACEE6C8A2597D82B206328096269579
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:44:29 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):88190
                      Entropy (8bit):2.2485431237911735
                      Encrypted:false
                      SSDEEP:384:ih3fHXNiSeMtMnh24HhTsFIuwMmbv6fnSidezVg8eZO:ilf30Se/XBTgIuwMKUdSpeZO
                      MD5:B01526D05EC4E46DC1CA8775E4AF6C3D
                      SHA1:4448C7D233C9CBB7CD7D4940980EB9A8E12DC857
                      SHA-256:9A4413160D664DA02B22A81DB9D6ECC5247B8C72B597EFCACF5A39816574784F
                      SHA-512:6318BAA41C7605C7849956E773A473141062B71BA7E201826F174A284F2C1852EE99A6C71AD529DD1D1AF8CA68DE19C9DB077D7FBA62767B4983C9B53E126A09
                      Malicious:false
                      Preview:MDMP..a..... .......].ag............T...............\............@..........T.......8...........T............J..............D!..........0#..............................................................................eJ.......#......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8312
                      Entropy (8bit):3.6953572160352888
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJp86IB6YU76rgmf1JXYZpBw89b0vsfY8m:R6lXJS6e6YI6rgmf1JXYb0Ufi
                      MD5:0883D09169D44B8E95532EF6AE330AFF
                      SHA1:BC20715457A7A77D97385B43EE13C4CA87A22ED0
                      SHA-256:92131587CE4FEE947D4DEEDFD38D31B666EE932256FF31DD300D18F0D541663A
                      SHA-512:3BDC8BE4FF7A8F629246C6525016841DA5FA554BD23E0F62605787D8E91086DBE0A8DE75D4F9D051423EB779591C95FA7F5348DAC7F86F52624997859297A907
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.451722631149647
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsBJg77aI90fWpW8VYvYm8M4JEgNdUFNHk+q8lQu36H45f+3E3Isd:uIjfTI7+O7VnJLoHk8KHsP3Isd
                      MD5:EF438862CAC5A323B1A36241876FAFB3
                      SHA1:BB321FFED2323057BE90874A766321BAD35247A9
                      SHA-256:C95D6DCFEC2F06B3326597E0CF07E3353B9C943D7D34E258E0EB87136ECA87D3
                      SHA-512:3F2CA5F63E850F00EFC78618E188E7E69461DEA4FD118D4E572D7AD71512F9CB4C831A05A30A3F2E074C82A33CB7EC999EE748B217EBD2E50C147E1424926B5E
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635447" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:44:30 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):81848
                      Entropy (8bit):2.2800244103136644
                      Encrypted:false
                      SSDEEP:384:/7vIXiTWnOfSeMfRnhM5bsL3HwsLr2JMqtwWnvY8o6/4:jvIyqn0SeWAbyHwse1vYWA
                      MD5:346AAD15DE2F18118F80FB813187693D
                      SHA1:371CBFBD07A192E1BAAC0A72405BD9B361ADA1D1
                      SHA-256:59DA734849FE7675EF8077127AD1794CB79188ED8A2CF7FC7D5FB50DCB9990C4
                      SHA-512:794E0F177074FB6378DD276A203A40423A37A795BF15966F48EC1BC69CFF231A5F8E1BACAC9F09129B902D1F5C9E27962BB110D23A93B8E421A97ED2414D9A71
                      Malicious:false
                      Preview:MDMP..a..... .......^.ag............$...............,.......D....=..........T.......8...........T............I...............!...........#..............................................................................eJ.......#......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8312
                      Entropy (8bit):3.693780953488003
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpZ68k6YUC6rgmf1JXYZpBw89b0vsf368m:R6lXJn6P6YR6rgmf1JXYb0Uf3g
                      MD5:CDB052640886032EF707298BB7B028E5
                      SHA1:4E7283C0741E0726D4C13EF1401B4D4C784E4E13
                      SHA-256:9AF455D4300C47E99AB9CA6AB81C49EC48B000D0EA98A73290D72D243FE823B3
                      SHA-512:5E8E4CD869B4CABBC385BC73B845F485A7EF78D0824B6569265425B626F636266C86292B7615707354612F93DA0568AD27FAF4056E151B0EC809F349BBF75BB4
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:14 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):68692
                      Entropy (8bit):2.068396012128746
                      Encrypted:false
                      SSDEEP:384:qj8YbfnSIaUNfBsPADzlLOVOZy5hCPKyXJg:q4YTSLUN5xdwII4Jg
                      MD5:5AF7023C6BC35B06F27C805FABEFE602
                      SHA1:B03D03218C1522979D8B84CB0042F89BA943DA60
                      SHA-256:8E7C3A8AE64469F526916C484B78E438D6B99B02C123EDB002DE84795B05F5DB
                      SHA-512:78230AE002B478088A80E7E674A797AE3DEC423A99B2397D36694B3CCF3BBCFC5EDB4C1D26C702A51D049FD56AE09FFCAE52F56CA2C9989F3D9DDEF199C3E3E8
                      Malicious:false
                      Preview:MDMP..a..... .........ag............T...............\............1..........T.......8...........T...............L...........t...........`...............................................................................eJ..............GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.4540917273426075
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsBJg77aI90fWpW8VYgYm8M4JEgNdUFSjBR+q8lQu36H45f+3E3Isd:uIjfTI7+O7VUJLjNR8KHsP3Isd
                      MD5:1FBCD1B5D74895A26F7A128A30CAE57C
                      SHA1:D7A9D501FD9556D93BDB53989FE8BB39EF0129F1
                      SHA-256:6C027C4F8C6D97453ADB3537D07D5A5DB1C45C6085A3C776F944BD509B743F9F
                      SHA-512:8E8B31373734B05D8CADA2A9B17B389F21AB4A9992FE0D7FD9571567CD911246E5B4A5663D7F2F713C04366373B6F17F58E1BBAB9194B3F96F34218FD5F055B5
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635447" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8284
                      Entropy (8bit):3.6942159731281947
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpf6+V56YU86rgmf1JXYZpBY89bnvsfytm:R6lXJh6+L6YP6rgmf1JXYznUfB
                      MD5:F6BB233D169DAE6D2EF32429C32F6688
                      SHA1:2DDF869DA8DAD9431EFC5ED91176D17133D608F8
                      SHA-256:C02090B4EF41479E86EA26938D71274E4EF6173584E0544BF6983FBD65A7423C
                      SHA-512:8DA8C302AE187079184C95E178F5FF67B044F3FBAD29D4D342D6AA229D9721BCFC92482B0193915B17093F3B7BD1786B15E84E484E3E3792DBE528220110BE92
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.4531449036746835
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsdJg77aI90fWpW8VY70Ym8M4JEgNdUFp+q8lQu36H45f+3E3Isd:uIjf3I7+O7VgJLM8KHsP3Isd
                      MD5:D03B2435E8F7A67207CC9D8511704663
                      SHA1:AD29448832BA2FBCFD80DC13838A5D4078D2A02F
                      SHA-256:92FF8A518FCAC928A5BFC62A8CADBC49B8B99CAEA83FEDDE80F8E635B40F029A
                      SHA-512:A510A5DC670F4D5C8BE2E54C06B4C59C5FB8D5043F09AA27B0E8C7D070BBFBFFD4C842CAB9FBD12F747501D858B660E71526C941DCE8CF8AC00E265CAAE92ED8
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:15 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):68432
                      Entropy (8bit):2.091286914699873
                      Encrypted:false
                      SSDEEP:384:FD8YbtTySIg3XfTsLzenEzlLOVOZy5hCF7fvXkuXF3I:GYVySrXb2mEdwII4OCI
                      MD5:412FE3321F5E4B2FF0CB4B2B824E3CE0
                      SHA1:43A0EF590C03140886049EF820F61C7556F7A058
                      SHA-256:42CD40583E83964F527BFCB6237E6FBA5A5DE00C6BF21468D7CC97BE10EB2F73
                      SHA-512:C9225CAF2981C6FEF383DF1926C42CCBC389468195833C9C18291A1E42AEB8C0C9207543069F5C467A1318E62C3433209FB8A2A738ECE444E835E82832BC0DB6
                      Malicious:false
                      Preview:MDMP..a..... .........ag............T...............\............1..........T.......8...........T...........0... ...........t...........`...............................................................................eJ..............GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8286
                      Entropy (8bit):3.697157883184296
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpu6Us6YUO6rgmf1JXYZpBRb89bevsfsFqm:R6lXJw6Us6Yt6rgmf1JXYXceUfsJ
                      MD5:9276BB929D093F169F9CFD608F7DC42D
                      SHA1:671EA40016125C67DCBA1389D723271518997925
                      SHA-256:8B9C48860CEE5E58AA65B3CBF948E1618C3060E412DA4D1B40C6229312460317
                      SHA-512:9261EE50015493A620FD247DA00B7F5D1B16D807D43139A176F5E953CD67F9E3BDC0945ECD7BBE829C28357B717E554F0C53D1A3182C36B36B101C0E4FB14E01
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.450431039927989
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsdJg77aI90fWpW8VY7pYm8M4JEgNdUFb+q8lQu36H45f+3E3Isd:uIjf3I7+O7VdJL+8KHsP3Isd
                      MD5:3ACF1B732ECDD46F51713BF2B50BE090
                      SHA1:969B3CEF8E8D0D3AA81F810394E3E9EB72A3B3A3
                      SHA-256:5B4E3B4302AC6DE3AA72974E0AC440B60764C993EBCB73CB144880DBF3BFCE44
                      SHA-512:3EE72F5F9050A5DBBBD215F9A2C3682F45EE46AC8770D94B1BF6E3DA15A5CBDD28A92560D1E2581EB8CACD728C9CF71C22EE02D07A5CBAA3BCFB18E02D6F5110
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:43:28 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):82490
                      Entropy (8bit):2.295281181776775
                      Encrypted:false
                      SSDEEP:384:h7vIXiv8Se9HdaAestewlw5/Z9s8pwDraDc0tPwr+Q7:1vIyUSe99+cewlw9Zmrb02a2
                      MD5:A1268DC810C0A991BE9549757B5066A6
                      SHA1:7196141346FCBD183A49F72F5B90D47A996517D8
                      SHA-256:51F542591C52105B08DDDA8A12307DA11ECA5ACDA37BD34E54726D000F68205C
                      SHA-512:E0FA5AC834D9E18ABBFDDD03FAD15D32863E99FE66B3E5684ADC1E586382D6136BE28164876012EA2B40CE2F864285BC3FA5BA82DD2838B20D4B49EFB3A4C722
                      Malicious:false
                      Preview:MDMP..a..... ....... .ag............$...............,.......t....=..........T.......8...........T...........HJ...............!...........#..............................................................................eJ.......#......GenuineIntel............T.......<.....agD............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:17 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):75578
                      Entropy (8bit):2.079002217336725
                      Encrypted:false
                      SSDEEP:384:MCOpYrIAesSIKopiUks/5x9kEzlLehzhCSc2A:qYM0SDUkeXkEdehz4t
                      MD5:22F47CEBB282F4745743B654C0489368
                      SHA1:F070791C806DFEC52048AEF422E3D61EB1B35502
                      SHA-256:62E4F5CCA1EDBF43A0CA33ACB70187A0EBE5CED0A5822CDC5BA23A64687BF63A
                      SHA-512:43F8BFCF5C9E5A88C82C5B1ACEDFD538BBB2FD78397C81AEF502701012A5F7C3A3CF54AF270D4B00BE82DABD0F7CAB974A338F5145B03C73284B03CDA7C6C4A7
                      Malicious:false
                      Preview:MDMP..a..... .........ag.........................................4..........T.......8...........T...............B.......................................................................................................eJ......(.......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8286
                      Entropy (8bit):3.695935721979889
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpW6B66YUQM6rgmf1JXYZpBv89bsvsfBEm:R6lXJI686YBM6rgmf1JXYmsUf3
                      MD5:C32E99D600D3E59B3F5DA55922B89CDE
                      SHA1:02B9A6C41319A8D159B91E06AB4837AF495BD448
                      SHA-256:CA698E66F67BD0CDDFF6D9CD73F04629D0DD1613F6E2B2FFA98A6B5A32D5E834
                      SHA-512:CFCF17BBD5988E14ACC0C386FC76A8E1ABEFF80A56B9E1B382375C9BB643F82783E9A95EE15A5540F239E829EE410BAC98A77ABF16277772C86BD24ED6423B4C
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.452210525311086
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsdJg77aI90fWpW8VY7dYm8M4JEgNdUF2YQf+q8lQu36H45f+3E3Isd:uIjf3I7+O7V1JLlYk8KHsP3Isd
                      MD5:761147E3E55DD8592A8C3C091A0D0CA5
                      SHA1:C277A0D09F3B5D7386A4F056B04BA22704224E73
                      SHA-256:E2676878CE32A5306F5547134034EC69ED47B8FAEF06509CC09277BD68EF8F59
                      SHA-512:39BEEA341C441F5DCEA2775FF6328189D8FFE9A0BF44F2E08413DA1B902D198F22F613F68311692D4121DF9C27D4CB0542EBC932C6B076B6D30B426E1DAEA370
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6330
                      Entropy (8bit):3.718716603984012
                      Encrypted:false
                      SSDEEP:96:RSIU6o7wVetbPn6eGtY1JXgiSH5aMOUJ89bP7psfR9Dm:R6l7wVeJPn6esY1JXYZpBJ89bzpsfRxm
                      MD5:8C511E4B36286202D745B35A84A8C0C8
                      SHA1:38DBD27C915F61DDD53F7E61D1E64424D4FD7050
                      SHA-256:9EF0CDB22CDBAB88AEFFF4BCA244B3E46322E2F11443B729FFA1411655B74431
                      SHA-512:8CE257CC280304CD2ABE267DFE6044F5A00CECCCA43925775C80454F4EA6BC9BDA1A072C0526442C97D527C077694EEED3636F77C5FBB1BF9A45C1D9ECEDB804
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.6.4.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.449903317621443
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsqJg77aI90fWpW8VY5Ym8M4JEgNdUFoP+q8lQuv345f+3E3Iad:uIjf4I7+O7VBJLL8v3sP3Iad
                      MD5:FD21A81A6914303862E594BD1CDED3D0
                      SHA1:29C1C5C4A466F5ED61B1F7B9D7AAF34F754E63D6
                      SHA-256:EAE28AEF4BA05A40A7BB0CDC652F6C84ED8D845FCCF2B52D7F6E91AB48F0F3CB
                      SHA-512:F1E0A3226B41FA0DA8E2C4887DC0D248B28EA1A9AE60FAD925B8BFAD7CAFC4A37415EC9F78FC1866ECFDBB18633E798EA32BDD08BC818D5C8C6ECA6664A3CA18
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635446" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:18 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):78088
                      Entropy (8bit):1.8929605122272735
                      Encrypted:false
                      SSDEEP:384:A4t1gxSi8pJmgmsrn+rMxEzlyLCplNpodmaL8u:11oS0gmCgMxE0egUaYu
                      MD5:2C491FA41CFB1DB687E109433BB24C9B
                      SHA1:E671E96A810F3EC578D84B46105CDC7BCB9B91CA
                      SHA-256:847C128A915421EC50F1AAE7AD88C24507F03927EE1B1FD179CC05C8D513D2D3
                      SHA-512:8FE1069DDBDD18A55E3B5AA8AF02D20F18A7937CD7210C148D2B289C801E2B123E57BDE263E2865CE4E0277C0D554962DB79D74AC84A5DDEA2110EDC87BBFAE5
                      Malicious:false
                      Preview:MDMP..a..... .........ag........................................n8..........T.......8...........T...........................@...........,...............................................................................eJ..............GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8288
                      Entropy (8bit):3.6962167156767283
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpj46vTaA6YUQ6rgmf1JXYZpB+89bLvsfr5m:R6lXJ946x6Yr6rgmf1JXYBLUf4
                      MD5:DFC1C36738222A89137867B190945B93
                      SHA1:2105A1FDBBADDC088A12AB6F887FA8FFA9115DE8
                      SHA-256:C163BA94382FE4BADEC7AB9B5E5A8F9126FDD6FEF671BB0B6B9E65E92D05F6A9
                      SHA-512:A6655365E3206C40E755F0B5D54F8E2D54AF1D83C307CCD994029734D3E4EC7D720FE9AEA12CF87FDC1C9D3758303E56A14BF298A34849B8DC1C617FA2BD0408
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.451618033733472
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zs2rJg77aI90fWpW8VY7dIPYm8M4JEgNdUFT+q8lQu36H45f+3E3Isd:uIjf2FI7+O7V4ISJLS8KHsP3Isd
                      MD5:CC577D0BE42EDF460504CC5C10724C8A
                      SHA1:2010237C262323EF932400798725ED4FE0237122
                      SHA-256:36715B2CD7248937AFCB1B7055AF223693126D852F728C7BC35FDFE13031DC6F
                      SHA-512:CFC1F8CB032A78431C37456497CE9E1D33C3FE5A5ECDEAC0D8B47AC8EADB150D9769B14619E3FD857D3E557DA3CD885D7DB104BC241A93B21850CA200921744B
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635444" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:43:30 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):76416
                      Entropy (8bit):2.355105412981425
                      Encrypted:false
                      SSDEEP:384:CnyUoo6LSedHdasasSBww/Dx1DKQWK/DzZTv0Abr:UyUoo8Sed9qbBwwbjXDtvJ3
                      MD5:511F31CFEB7AAE7C4713AB166305C52A
                      SHA1:F2E0F8BC726DECB8C73355EF33EB4602806F4D2C
                      SHA-256:003CD0EA2E181BCDCBC554770BC3CB2F4F39E8D1C00D1AA80B978400EE65FEBA
                      SHA-512:F121DD66C8CB46A1F5B0D6ACDEC2B1CD9B77DD901CFCD54D1156C0CB2404321290C78734B999437B9FFA7EAAC959292EB3C27CAD925441A7FE1FE1923C978AEE
                      Malicious:false
                      Preview:MDMP..a..... .......".ag....................................D....:..........T.......8...........T............I............... ..........."..............................................................................eJ......h#......GenuineIntel............T.......<.....agE............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):6330
                      Entropy (8bit):3.717298929040246
                      Encrypted:false
                      SSDEEP:96:RSIU6o7wVetbPf6CGY1JXgiSH5aMOUr89bPbpsfj9jm:R6l7wVeJPf6jY1JXYZpBr89bjpsfjBm
                      MD5:8FBA5AE6B1072FA1F4FD821EF504C569
                      SHA1:301DBCC0EB89F5D3DB79304D3D9D7CD093A75854
                      SHA-256:EA51E3F9CF1F3D1398B99C682FB4F16F4D20082853C7CFB2147D77F6DFBFB6E0
                      SHA-512:F8AD69643BC9C9634574EDB1E1DA501D76C2A39AC20E8779EB6BAB9C442560A11D8364EDBF5374ED57900B5865D7E74246EB05E46EC2A9F9E0B25FD2FC43228A
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.6.4.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.449814250473576
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsqJg77aI90fWpW8VYiRYm8M4JEgNdUFg+q8lQuv345f+3E3Iad:uIjf4I7+O7VNQJLx8v3sP3Iad
                      MD5:D9275D9E5241554C3FDA76EB59A19C71
                      SHA1:E177A438FE7ADB053401239D786B21E84D9D15C4
                      SHA-256:76C8A0603A492771E4868DE6C55EED7151DFD216A6C0A05B8F5D67859224C59B
                      SHA-512:DC04E5E9C1E02B834E5F152DD146BBD23F60E1A5FD2A53C4E7F8E17D5BCBDB04C08BF31F166DE184180020FC5CBE8BB25D510D7EFF9672E8A876408E28D3CB1F
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635446" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:21 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):108772
                      Entropy (8bit):2.2667231558157797
                      Encrypted:false
                      SSDEEP:384:fDaAWhsSeBJ0QnjbowsBYBKPyL1ihUShaX+YxE/zpUcXnUD/555vsqrNm:uAusSejblDBl1WhaOeyzmcXK557E
                      MD5:4E630E680139C9DF1F039082AE27F735
                      SHA1:6391AB69223E6B69F2A6BDC50CE628D8DCE104EB
                      SHA-256:029C8E3FD7F0E96C1B526A436A35C7E40D7F491026371EF1FA2A631596D13D4B
                      SHA-512:7609738B30B458CF488324957DADF4842AD1E25A2D7BF84AE2BC3AA2DC9E8D735ACC4D41A29C8037D34FA7AA7983507764BFD4E652B0A57E8C83FB5953369CBF
                      Malicious:false
                      Preview:MDMP..a..... .........ag....................................t...FH..........T.......8...........T............?...h........... ..........|"..............................................................................eJ.......#......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8292
                      Entropy (8bit):3.6952115297419224
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpJ6y6YUX6rgmf1JXYZpBT89b5vsfxTm:R6lXJH6y6YM6rgmf1JXYS5UfI
                      MD5:90DC17FD935DBFE385D21A91EEE9F64E
                      SHA1:FA9336442E3363462BA2294593ECBE943B378994
                      SHA-256:EA55B420C1F16732061CE4FF8F1514E8A2FF45EDB209622DAF3B3EBC0595E26B
                      SHA-512:5735A89734BE94B8965C8E8B03DE96B755EB650D2CF2041A79B1D914216F26A893B30B7D1F98868C8DC7A93FB8E3AD8FDA497436B6C8B815B5B3603229E20BA2
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.452065628163082
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zs2rJg77aI90fWpW8VY3tYm8M4JEgNdUF6+q8lQu36H45f+3E3Isd:uIjf2FI7+O7VSsJL/8KHsP3Isd
                      MD5:1DDD687849FB53D3CA301AF91DB1E5D6
                      SHA1:1DD7BD658BB4CE4E7367C3198A0C494138088604
                      SHA-256:89F6C4E348BA9FEE2854898D94065FA411C6DC31183D630EBDB6EDC290B8A16D
                      SHA-512:708E1B2A236F07D65596A5EB2FDCCBFB45282F567F87C435448253CC539B1C85E75FB9AC30BFD0BCA2856EBD9CB1E8D69B4E9907D2B55643FB17B513C106B457
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635444" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:41:22 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):123956
                      Entropy (8bit):2.310026722428655
                      Encrypted:false
                      SSDEEP:384:aGpgwnfihSeM+/Ddqn81NfwBKPyL1ihU/vsXYPy6xO1CTdP19npI42pXvcLjhYLO:dgvhSerN1NoBl1LvJhzdPNeXvNO
                      MD5:FD7934E1EF6E20ABDAE58813192D1C99
                      SHA1:F12787301E60B730FE9CEF1342EFFD6386D2EA38
                      SHA-256:CD07404A1691260401995CFAE3A9FAE4D53AD7B397A3E2E52FF2A2BD6620F97D
                      SHA-512:AED3C20B2E079ED9CB23EC4723FE4E4ABED48530F4E19A150EBC3B4847F59CED69E5CE1110A94CE6312F16C7572FF070AC562B742965C002EA4773A5BFA34F40
                      Malicious:false
                      Preview:MDMP..a..... .........ag.........................................L..........T.......8...........T............L..............."...........#..............................................................................eJ.......$......GenuineIntel............T.......l.....ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8292
                      Entropy (8bit):3.6948352666275848
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJp46RC6YUk6rgmf1JXYZpBT89bivsf92m:R6lXJm6k6Yf6rgmf1JXYSiUf1
                      MD5:46F8CDDC19A66080E79483D1CA1AB179
                      SHA1:09555F08E033333A13D3BF1691A64372C230D3D4
                      SHA-256:CA413ED37D8731389C354CA2780BFBE926B206A545858DA359C05B196FA13025
                      SHA-512:537218BC738B809EBA0B24797975AA1A388D7386B38E697D77A5569A601A01BD13600312DDC070568F8506B2594859A38D97F6BFC0F39E42376653008102506C
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.452236297226789
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zs2rJg77aI90fWpW8VYwYm8M4JEgNdUFWL+q8lQu36H45f+3E3Isd:uIjf2FI7+O7VoJLZ8KHsP3Isd
                      MD5:ED787107BF932D7A6FF589463B0770AF
                      SHA1:1DFCB7AF0A532FDCEC3CDF7DF5CD092A51F0B239
                      SHA-256:2FBAF7626DDDC3B118B838FBE794B966DC181A3E6011F974F784F068B7FEF83D
                      SHA-512:E84881E78AFE4261AB7F7F64B7E359F03758E2FC2BCA9D28ED14DD140D4B064A80371B7E8D13FEED773B2B96715BFF8F01274315D2A0F1EFF651867FF16CD113
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635444" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 15:43:17 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):99192
                      Entropy (8bit):2.173976654721859
                      Encrypted:false
                      SSDEEP:384:mQgniZ/SeMFvn/gsEiRwXOqyE7RlQzZueN0WFxEQNJI/uKi:pgidSesg9YwXOPhuevxKhi
                      MD5:57C8A2A10363D177DA888C1D5BA08DF1
                      SHA1:BC9B622D6E1FA6860EBC50B2FB5B809AE396546E
                      SHA-256:08B37DB17D93ECA9FD0F83DA9D98D71B6F0B5B28DA8D5436A67BC26542FD336E
                      SHA-512:2328FBB420549A3D8627C24E3D910B37C271929826C0DF7D19BF0BFECBED5C5F1A8CCCA51CB4820DF3720EDB6609FF5697EF73DD2B523D572353BE0A7FEDC25D
                      Malicious:false
                      Preview:MDMP..a..... .........ag.........................................F..........T.......8...........T............L..x7...........!...........#..............................................................................eJ......($......GenuineIntel............T.......l.....agT............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8312
                      Entropy (8bit):3.695371154570197
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJpj6lQ6YUB6rgmf1JXdkZpBa89bOvsfetam:R6lXJN6S6YS6rgmf1JXaVOUfc
                      MD5:16300AD45E01B9CAA4D8E06FFA49DA37
                      SHA1:41FBB6DFC211098C76195CFE4B7864DB23D02229
                      SHA-256:7045500BED2F85BEDE562371292D502B0554F051C4A7425BDE53E81A6E066043
                      SHA-512:BAD6520D5F3C5C505F0E3EEC252CE0098CC0FED07E8AEA1D42151187BA8831F6BCF1FBB152E169A1842BB7A54C4F2DA56815824F2E251606ED09D938EA74B9DC
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.2.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.453499868979685
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zs/Jg77aI90fWpW8VYcF5Ym8M4JEgNdUFCP+q8lQu36H45f+3E3Isd:uIjfhI7+O7VvoJLRP8KHsP3Isd
                      MD5:C5B0CD3017D483692190C6BFA300581B
                      SHA1:556643DB820178EC992411AA17979A7D4F7386A4
                      SHA-256:AEFC0B2778131E98D2C0AAE9D324E19FF5F456915C935D6BAC4890A42F536107
                      SHA-512:504A2F0FE9917C219C32B2C6A8B81D7A673B2F129A1CE52821A1C596146772830DEAEDF41E9F84A899BAA7AD63600356C45B79DE9D7551FC67E4C3CF7C468F52
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635445" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF, CR line terminators
                      Category:modified
                      Size (bytes):1245
                      Entropy (8bit):5.256331100535602
                      Encrypted:false
                      SSDEEP:24:2dcd4+ScU2/P1m6edKIL6LMhEMO5pwHYeGaDt0cORv23f9Apgln:cmtbn1edKIL6QdOQHuaDN3gC
                      MD5:BC4AF0BDDDBFD455F19E0322214052DA
                      SHA1:916F3C17EE72CFE52E3BF71420E2FD53E451EB00
                      SHA-256:3828B3C6AB9C9311A345CA256E34118DDA6B11F3DFEA6D42C82B08642E97C61C
                      SHA-512:8227CD7B045A9BA05CB9E8C5C4113858BA74053FA57771CF762BA1B82CEEF2116494452F095460F32F1169E949EA36FEC9BA0381C22D96049E522BEB7A88FBF8
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-16"?>...<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">... <RegistrationInfo>... <Date>2024-12-17T10:41:08</Date>... <Author>user-PC\user</Author>... <URI>\w3oN7Nlibd06</URI>... </RegistrationInfo>... <Principals>... <Principal id="Author">... <UserId>S-1-5-21-2246122658-3693405117-2476756634-1002</UserId>... <LogonType>InteractiveToken</LogonType>... <RunLevel>HighestAvailable</RunLevel>... </Principal>... </Principals>... <Settings>... <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>... <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>... <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>... <IdleSettings>... <Duration>PT10M</Duration>... <WaitTimeout>PT1H</WaitTimeout>... <StopOnIdleEnd>true</StopOnIdleEnd>... <RestartOnIdle>false</RestartOnIdle>... </IdleSettings>... </Settings>... <Triggers>... <LogonTrigger>
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF, CR line terminators
                      Category:modified
                      Size (bytes):1245
                      Entropy (8bit):5.252972011852054
                      Encrypted:false
                      SSDEEP:24:2dcd4+ScU2jx1m6edKIL6LMhEMO5pwHYeGaDt0cORv23f9Apgln:cmtbjx1edKIL6QdOQHuaDN3gC
                      MD5:F42A69A2F07118DC86A2CE4A23A2D8FF
                      SHA1:686987E4C2BF9B6047E540F6E4598597C3B711D8
                      SHA-256:E13BE217812E20C1659BEF7A2D0C948C4876A38F04BA86BDC4EE80C3AB9E1C39
                      SHA-512:3E2238CF51D8C0AF54315E6DD3E82421FFC92C63C96C14F41D3FBCACF04234D883F464C376A63BDAA18A2B5F32E89BA285337CC42323E0B0797E46E7617FB0A0
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-16"?>...<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">... <RegistrationInfo>... <Date>2024-12-17T10:41:11</Date>... <Author>user-PC\user</Author>... <URI>\w3oN7Nlibd06</URI>... </RegistrationInfo>... <Principals>... <Principal id="Author">... <UserId>S-1-5-21-2246122658-3693405117-2476756634-1002</UserId>... <LogonType>InteractiveToken</LogonType>... <RunLevel>HighestAvailable</RunLevel>... </Principal>... </Principals>... <Settings>... <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>... <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>... <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>... <IdleSettings>... <Duration>PT10M</Duration>... <WaitTimeout>PT1H</WaitTimeout>... <StopOnIdleEnd>true</StopOnIdleEnd>... <RestartOnIdle>false</RestartOnIdle>... </IdleSettings>... </Settings>... <Triggers>... <LogonTrigger>
                      Process:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                      Category:modified
                      Size (bytes):3136080
                      Entropy (8bit):5.757124319357467
                      Encrypted:false
                      SSDEEP:49152:Df8YD/FsmFicakLoY4fIKSW6TItcakL62XgNzcwO2RmBoV8cakLoY4fIKSW6TIty:Df8k/FsmFicakH4fInW6McakpXgNzcwp
                      MD5:7D77F1110DE8074096D1993EC3061470
                      SHA1:6F95F8C582A80C2D5F6201B17C82C1516431E8A3
                      SHA-256:9D66D4EB338794F23A10E6BB736094F6E314D58188054C1D6817A7858A7B65E8
                      SHA-512:83F87764BE24887135678341DC7E961497B796F01571B7BD192EB3384375880C8A15098EDD43084FB04682DE0D01388F7C65DC78714B76CD5C8008F56A54CDE4
                      Malicious:true
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................................%.......%...@...........................%...............................................%.............................................................\.%.....................................................UPX0....................................UPX1................................@...UPX2..........%.....................@....bss.... .........H.._...N_..,.._...._..~.._O..<_...._..x.9_}.F.8_...._..&.B_..4.d_z..S_L.6.._H.&.}_U..._..G.._(.G.5_...._>.M.z_...._e.{.._...H_M...._l..._G.K.._..r.._...._..z.._..a.._...p_@.I.._Z..G_O...._..D.._..O.m_=...[_..v.._....._v./."_@...._...~_j..._J..._...I_L...q_..?.._....~_....._h.`.m_....._....._..b.6_...._N...._..<.f_..p.._Z.).._..g.._V.Y.I_k.k.._..^.._..&.+_...._....{_m...._...[_c..!_....._e..._...._..T.._b...M_...y_...U_../.._..j.._!..._... _...1_(.._..
                      Process:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                      Category:dropped
                      Size (bytes):3136080
                      Entropy (8bit):5.757124319357467
                      Encrypted:false
                      SSDEEP:49152:Df8YD/FsmFicakLoY4fIKSW6TItcakL62XgNzcwO2RmBoV8cakLoY4fIKSW6TIty:Df8k/FsmFicakH4fInW6McakpXgNzcwp
                      MD5:7D77F1110DE8074096D1993EC3061470
                      SHA1:6F95F8C582A80C2D5F6201B17C82C1516431E8A3
                      SHA-256:9D66D4EB338794F23A10E6BB736094F6E314D58188054C1D6817A7858A7B65E8
                      SHA-512:83F87764BE24887135678341DC7E961497B796F01571B7BD192EB3384375880C8A15098EDD43084FB04682DE0D01388F7C65DC78714B76CD5C8008F56A54CDE4
                      Malicious:true
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................................%.......%...@...........................%...............................................%.............................................................\.%.....................................................UPX0....................................UPX1................................@...UPX2..........%.....................@....bss.... .........H.._...N_..,.._...._..~.._O..<_...._..x.9_}.F.8_...._..&.B_..4.d_z..S_L.6.._H.&.}_U..._..G.._(.G.5_...._>.M.z_...._e.{.._...H_M...._l..._G.K.._..r.._...._..z.._..a.._...p_@.I.._Z..G_O...._..D.._..O.m_=...[_..v.._....._v./."_@...._...~_j..._J..._...I_L...q_..?.._....~_....._h.`.m_....._....._..b.6_...._N...._..<.f_..p.._Z.).._..g.._V.Y.I_k.k.._..^.._..&.+_...._....{_m...._...[_c..!_....._e..._...._..T.._b...M_...y_...U_../.._..j.._!..._... _...1_(.._..
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.465449353414441
                      Encrypted:false
                      SSDEEP:6144:FIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNpdwBCswSb6:mXD94+WlLZMM6YFHT+6
                      MD5:40B86B0D624EC737A5F904FC4C89F1CF
                      SHA1:90AC731A2716377913111CA91D826CC3F01BF501
                      SHA-256:BDFB559EB4317FB78F0532A3F63593CA3CB1C7709F50EF2DFFED686E5D556446
                      SHA-512:AFC94006E7D854093B6CCCEBA0699CA52980C1852D2673F00692D2578DF53A0F405FE90B67B6E73ECA6E1B71162EFB38031280B7CB1AEBC54EBE96E58E737E84
                      Malicious:false
                      Preview:regfC...C....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.=...P.................................................................................................................................................................................................................................................................................................................................................,........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                      Entropy (8bit):5.756460153004245
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.66%
                      • UPX compressed Win32 Executable (30571/9) 0.30%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • VXD Driver (31/22) 0.00%
                      File name:htkeUc1zJ0.exe
                      File size:3'136'080 bytes
                      MD5:64fbd4176cf9fb77d63173f809b2433d
                      SHA1:737e70ae50f2616dc445d8244d192a63d48a11bc
                      SHA256:80ff41fea4b4580608227df8a352de5497fc84b6bf5bca9613265cedd1005c5a
                      SHA512:e5305aeff37a8610b260b76afa680ab432ad900ff03631af367b60edcfb497d602e2cdf30be233c816ddb9edf2b25861d76b21ed5b901378512462aee7bcf20f
                      SSDEEP:49152:C+5puFNqGpcakLoY4fIKSW6TItcakL62XgNzcwO2RmBoV8cakLoY4fIKSW6TItcl:C+5puF4GpcakH4fInW6McakpXgNzcwOE
                      TLSH:76E523A3B63D85F2DC5D31721FAB6472837DAE84C37612510ADCA858CEB5C6B082B7D1
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................................%.......%...@...........................%............................................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x659f9f
                      Entrypoint Section:UPX1
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                      DLL Characteristics:
                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                      TLS Callbacks:0x659c92
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:52d5086abc1dabd2119b92104f1111a0
                      Instruction
                      mov eax, 005DE6A0h
                      jmp eax
                      or edi, ebx
                      and eax, eax
                      sub edx, ecx
                      dec edi
                      sub ebx, esi
                      mov edi, edx
                      sub edx, 5A504817h
                      add esi, eax
                      not esi
                      sub eax, edx
                      sub ecx, FA379E8Ah
                      inc esi
                      sub ebx, edx
                      add ebx, ebx
                      or esi, ecx
                      mov ebx, 23BD1CF7h
                      inc edx
                      dec ebx
                      ret
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x25b0000xf4UPX2
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x259a5c0x18UPX1
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      UPX00x10000x1dc0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      UPX10x1dd0000x7e0000x7d20040e3c2fc15d4b919ac514d1b327d291bFalse0.6978782935814186data5.750671110773164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      UPX20x25b0000x10000x200ad4d5e0c26cac0971bc8645faa91861aFalse0.31640625data2.2453931745398656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      DLLImport
                      KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                      oleaut32.dllSysFreeString
                      user32.dllMessageBoxA
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-17T16:41:22.890495+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449733172.232.31.180443TCP
                      2024-12-17T16:41:31.608968+01002824544ETPRO MALWARE Malicious SSL Certificate Detected (Gootkit CnC)1172.232.31.180443192.168.2.449731TCP
                      2024-12-17T16:41:31.971678+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449731172.232.31.180443TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 17, 2024 16:41:14.365425110 CET49730443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:14.365461111 CET44349730104.20.4.235192.168.2.4
                      Dec 17, 2024 16:41:14.365622997 CET49730443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:14.365694046 CET49730443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:14.365798950 CET44349730104.20.4.235192.168.2.4
                      Dec 17, 2024 16:41:14.365849972 CET49730443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:15.118967056 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:15.119020939 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:15.119203091 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:15.260694027 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:15.260720968 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:19.725594044 CET49732443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:19.725655079 CET44349732104.20.4.235192.168.2.4
                      Dec 17, 2024 16:41:19.725743055 CET49732443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:19.725872040 CET49732443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:19.725955009 CET44349732104.20.4.235192.168.2.4
                      Dec 17, 2024 16:41:19.726025105 CET49732443192.168.2.4104.20.4.235
                      Dec 17, 2024 16:41:19.739522934 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:19.739548922 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:19.739852905 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:19.751017094 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:19.751064062 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:21.031366110 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:21.031537056 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.550721884 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.550801992 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.551785946 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.551902056 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.555746078 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.603332043 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.890562057 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.890640974 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.890675068 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.890719891 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.890722990 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:22.890773058 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.898019075 CET49733443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:22.898056984 CET44349733172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:23.630131960 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:23.750674963 CET804973469.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:23.750787973 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:23.751063108 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:23.870534897 CET804973469.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:24.916553974 CET804973469.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:24.916631937 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:25.316097975 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:25.723390102 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:25.723537922 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:25.723902941 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:25.843427896 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.045860052 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.045885086 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.045902014 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046000004 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.046036959 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046056032 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046117067 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.046185970 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046202898 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046217918 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046233892 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046242952 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.046250105 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.046271086 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.046293974 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.166030884 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.166095018 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.166138887 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.166201115 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.237891912 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.237957001 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.237967014 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.238012075 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.241921902 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.241980076 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.242032051 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.242084980 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.250358105 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.250422955 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.250468016 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.250566959 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.258918047 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.258980036 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.259015083 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.259069920 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:27.267256975 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:27.267329931 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:31.526192904 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.526376009 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.608938932 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.608968019 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.609332085 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.609395981 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.611130953 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.651344061 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.971235037 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.971324921 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.971340895 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.971398115 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.976212025 CET49731443192.168.2.4172.232.31.180
                      Dec 17, 2024 16:41:31.976234913 CET44349731172.232.31.180192.168.2.4
                      Dec 17, 2024 16:41:31.977286100 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:32.046224117 CET804973664.190.63.136192.168.2.4
                      Dec 17, 2024 16:41:32.046367884 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:41:32.096971035 CET804974169.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:32.097094059 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:32.097323895 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:32.217211008 CET804974169.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:33.261677027 CET804974169.16.230.228192.168.2.4
                      Dec 17, 2024 16:41:33.261809111 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:41:33.746964931 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:41:33.867167950 CET8049743199.59.243.227192.168.2.4
                      Dec 17, 2024 16:41:33.867367029 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:41:33.867597103 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:41:33.987153053 CET8049743199.59.243.227192.168.2.4
                      Dec 17, 2024 16:41:34.983200073 CET8049743199.59.243.227192.168.2.4
                      Dec 17, 2024 16:41:34.983254910 CET8049743199.59.243.227192.168.2.4
                      Dec 17, 2024 16:41:34.983319998 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:41:34.983320951 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:41:44.984303951 CET8049743199.59.243.227192.168.2.4
                      Dec 17, 2024 16:41:44.984445095 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:42:29.916976929 CET804973469.16.230.228192.168.2.4
                      Dec 17, 2024 16:42:29.917057991 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:42:38.263602972 CET804974169.16.230.228192.168.2.4
                      Dec 17, 2024 16:42:38.263710022 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:43:04.409832954 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:04.410008907 CET4974180192.168.2.469.16.230.228
                      Dec 17, 2024 16:43:04.529558897 CET804974169.16.230.228192.168.2.4
                      Dec 17, 2024 16:43:04.877016068 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:05.564610004 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:06.861417055 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:09.377046108 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:09.705578089 CET4973480192.168.2.469.16.230.228
                      Dec 17, 2024 16:43:09.705626965 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:43:09.826726913 CET804973469.16.230.228192.168.2.4
                      Dec 17, 2024 16:43:10.955212116 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:43:13.455212116 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:43:14.267693043 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:18.564634085 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:43:23.973692894 CET4974380192.168.2.4199.59.243.227
                      Dec 17, 2024 16:43:28.564634085 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:43:48.564856052 CET4973680192.168.2.464.190.63.136
                      Dec 17, 2024 16:44:28.455712080 CET4973680192.168.2.464.190.63.136
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 17, 2024 16:41:14.218353033 CET5797853192.168.2.41.1.1.1
                      Dec 17, 2024 16:41:14.357032061 CET53579781.1.1.1192.168.2.4
                      Dec 17, 2024 16:41:14.598084927 CET5920853192.168.2.41.1.1.1
                      Dec 17, 2024 16:41:15.099361897 CET53592081.1.1.1192.168.2.4
                      Dec 17, 2024 16:41:22.899207115 CET5168253192.168.2.41.1.1.1
                      Dec 17, 2024 16:41:23.237021923 CET53516821.1.1.1192.168.2.4
                      Dec 17, 2024 16:41:24.919334888 CET5917753192.168.2.41.1.1.1
                      Dec 17, 2024 16:41:25.314878941 CET53591771.1.1.1192.168.2.4
                      Dec 17, 2024 16:41:33.264233112 CET6387653192.168.2.41.1.1.1
                      Dec 17, 2024 16:41:33.745110035 CET53638761.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 17, 2024 16:41:14.218353033 CET192.168.2.41.1.1.10xea05Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:14.598084927 CET192.168.2.41.1.1.10x7f9eStandard query (0)cutit.orgA (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:22.899207115 CET192.168.2.41.1.1.10x288fStandard query (0)ww99.cutit.orgA (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:24.919334888 CET192.168.2.41.1.1.10xed90Standard query (0)ww1.cutit.orgA (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:33.264233112 CET192.168.2.41.1.1.10x2356Standard query (0)ww7.cutit.orgA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 17, 2024 16:41:14.357032061 CET1.1.1.1192.168.2.40xea05No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:14.357032061 CET1.1.1.1192.168.2.40xea05No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:14.357032061 CET1.1.1.1192.168.2.40xea05No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:15.099361897 CET1.1.1.1192.168.2.40x7f9eNo error (0)cutit.org172.232.31.180A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:15.099361897 CET1.1.1.1192.168.2.40x7f9eNo error (0)cutit.org172.232.4.213A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:15.099361897 CET1.1.1.1192.168.2.40x7f9eNo error (0)cutit.org172.232.25.148A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:23.237021923 CET1.1.1.1192.168.2.40x288fNo error (0)ww99.cutit.org69.16.230.228A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:25.314878941 CET1.1.1.1192.168.2.40xed90No error (0)ww1.cutit.orgsedoparking.comCNAME (Canonical name)IN (0x0001)false
                      Dec 17, 2024 16:41:25.314878941 CET1.1.1.1192.168.2.40xed90No error (0)sedoparking.com64.190.63.136A (IP address)IN (0x0001)false
                      Dec 17, 2024 16:41:33.745110035 CET1.1.1.1192.168.2.40x2356No error (0)ww7.cutit.org78626.bodis.comCNAME (Canonical name)IN (0x0001)false
                      Dec 17, 2024 16:41:33.745110035 CET1.1.1.1192.168.2.40x2356No error (0)78626.bodis.com199.59.243.227A (IP address)IN (0x0001)false
                      • cutit.org
                      • ww99.cutit.org
                      • ww1.cutit.org
                      • ww7.cutit.org
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.44973469.16.230.228805228C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      Dec 17, 2024 16:41:23.751063108 CET176OUTGET /oxgBR HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Cache-Control: no-cache
                      Host: ww99.cutit.org
                      Connection: Keep-Alive
                      Dec 17, 2024 16:41:24.916553974 CET276INHTTP/1.1 302 Moved Temporarily
                      Date: Tue, 17 Dec 2024 15:41:24 GMT
                      Content-Type: text/html
                      Content-Length: 0
                      Connection: keep-alive
                      Location: http://ww1.cutit.org/oxgBR?usid=27&utid=9975973299
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Access-Control-Allow-Origin: *


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.44973664.190.63.136805228C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      Dec 17, 2024 16:41:25.723902941 CET199OUTGET /oxgBR?usid=27&utid=9975973299 HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Cache-Control: no-cache
                      Connection: Keep-Alive
                      Host: ww1.cutit.org
                      Dec 17, 2024 16:41:27.045860052 CET1236INHTTP/1.1 200 OK
                      date: Tue, 17 Dec 2024 15:41:26 GMT
                      content-type: text/html; charset=UTF-8
                      transfer-encoding: chunked
                      vary: Accept-Encoding
                      expires: Mon, 26 Jul 1997 05:00:00 GMT
                      cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                      pragma: no-cache
                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_TgGO/4IelHRqJvItjLquTHEvvvhUJuyEmQi7d8oHdbg/EzZSP1yuI/o8LOHaZ185fyiB4+9vC8UCNbCdZmleNg==
                      last-modified: Tue, 17 Dec 2024 15:41:26 GMT
                      x-cache-miss-from: parking-dc6db864f-2lgfp
                      server: Parking/1.0
                      Data Raw: 32 45 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 54 67 47 4f 2f 34 49 65 6c 48 52 71 4a 76 49 74 6a 4c 71 75 54 48 45 76 76 76 68 55 4a 75 79 45 6d 51 69 37 64 38 6f 48 64 62 67 2f 45 7a 5a 53 50 31 79 75 49 2f 6f 38 4c 4f 48 61 5a 31 38 35 66 79 69 42 34 2b 39 76 43 38 55 43 4e 62 43 64 5a 6d 6c 65 4e 67 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 63 75 74 69 74 2e 6f 72 67 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 63 75 74 69 74 20 52 65 73 6f [TRUNCATED]
                      Data Ascii: 2E3<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_TgGO/4IelHRqJvItjLquTHEvvvhUJuyEmQi7d8oHdbg/EzZSP1yuI/o8LOHaZ185fyiB4+9vC8UCNbCdZmleNg==><head><meta charset="utf-8"><title>cutit.org&nbsp;-&nbsp;cutit Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="cutit.org is your first and best source for all of the information youre looking for. From general
                      Dec 17, 2024 16:41:27.045885086 CET1236INData Raw: 74 6f 70 69 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79 6f 75 20 77 6f 75 6c 64 20 65 78 70 65 63 74 20 74 6f 20 66 69 6e 64 20 68 65 72 65 2c 20 63 75 74 69 74 2e 6f 72 67 20 68 61 73 20 69 74 20 61 6c 6c 2e 20 57 65 20 68 6f 70
                      Data Ascii: topics to more of what you would expect to find here, cutit.org has it all. We hope you find what you are searching for!"><link r1062el="icon" type="image/png" href="//img.sedoparking.com/templates/logos/sedo_logo.p
                      Dec 17, 2024 16:41:27.045902014 CET1236INData Raw: 73 74 79 6c 65 3a 6e 6f 6e 65 7d 73 76 67 3a 6e 6f 74 28 3a 72 6f 6f 74 29 7b 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 7d 62 75 74 74 6f 6e 2c 69 6e 70 75 74 2c 6f 70 74 67 72 6f 75 70 2c 73 65 6c 65 63 74 2c 74 65 78 74 61 72 65 61 7b 66 6f
                      Data Ascii: style:none}svg:not(:root){overflow:hidden}button,input,optgroup,select,textarea{font-family:sans-serif;font-size:100%;line-height:1.15;margin:0}button,input{overflow:visible}button,select{text-transform:none}button,html [type=button],[type=res
                      Dec 17, 2024 16:41:27.046036959 CET1236INData Raw: 61 6e 76 61 73 7b 64 69 73 70 6c 61 79 3a 69 6e 6c 69 6e 65 2d 62 6c 6f 63 6b 7d 74 65 6d 70 6c 61 74 65 7b 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 7d 5b 68 69 64 64 65 6e 5d 7b 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 7d 2e 61 6e 6e 6f 75 6e 63 65 6d 65
                      Data Ascii: anvas{display:inline-block}template{display:none}[hidden]{display:none}.announcement{background:#0e162e;text-align:center;padding:0 5px}.announcement p{color:#848484}.announcement a{color:#848484}.container-header{margin:0 auto 0 auto;text-ali
                      Dec 17, 2024 16:41:27.046056032 CET1236INData Raw: 64 69 73 63 6c 61 69 6d 65 72 20 61 7b 63 6f 6c 6f 72 3a 23 39 34 39 34 39 34 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 69 6d 70 72 69 6e 74 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 69 6d 70 72 69 6e 74
                      Data Ascii: disclaimer a{color:#949494}.container-imprint{text-align:center}.container-imprint__content{display:inline-block}.container-imprint__content-text,.container-imprint__content-link{font-size:10px;color:#949494}.container-contact-us{text-align:ce
                      Dec 17, 2024 16:41:27.046185970 CET1236INData Raw: 65 3a 6c 61 72 67 65 72 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6f 6b 69 65 2d 6d 65 73 73 61 67 65 20 61 7b 63 6f 6c 6f 72 3a 23 66 66 66 7d 2e 63 6f 6f 6b 69 65 2d 6d 6f 64 61 6c 2d 77 69 6e 64 6f 77 7b 70 6f 73 69 74 69 6f 6e 3a 66 69 78 65
                      Data Ascii: e:larger}.container-cookie-message a{color:#fff}.cookie-modal-window{position:fixed;background-color:rgba(200,200,200,.75);top:0;right:0;bottom:0;left:0;-webkit-transition:all .3s;-moz-transition:all .3s;transition:all .3s;text-align:center}.c
                      Dec 17, 2024 16:41:27.046202898 CET1236INData Raw: 7d 2e 62 74 6e 2d 2d 73 75 63 63 65 73 73 2d 73 6d 3a 68 6f 76 65 72 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 31 61 36 62 32 63 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 31 61 36 62 32 63 3b 63 6f 6c 6f 72 3a 23 66 66 66 3b 66
                      Data Ascii: }.btn--success-sm:hover{background-color:#1a6b2c;border-color:#1a6b2c;color:#fff;font-size:initial}.btn--secondary{background-color:#8c959c;border-color:#8c959c;color:#fff;font-size:medium}.btn--secondary:hover{background-color:#727c83;border-
                      Dec 17, 2024 16:41:27.046217918 CET1236INData Raw: 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 65 31 36 32 65 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 41 72 69 61 6c 2c 48 65 6c 76 65 74 69 63 61 2c 56 65 72 64 61 6e 61 2c 22 4c 75 63 69 64 61 20 47 72 61 6e 64 65 22 2c 73 61 6e 73 2d 73 65 72 69 66 7d 62
                      Data Ascii: und-color:#0e162e;font-family:Arial,Helvetica,Verdana,"Lucida Grande",sans-serif}body.cookie-message-enabled{padding-bottom:300px}.container-footer{padding-top:20px;padding-left:5%;padding-right:5%;padding-bottom:10px}.container-content{text-a
                      Dec 17, 2024 16:41:27.046233892 CET1236INData Raw: 29 3b 74 72 61 6e 73 66 6f 72 6d 3a 73 63 61 6c 65 58 28 2d 31 29 3b 7a 2d 69 6e 64 65 78 3a 2d 31 3b 74 6f 70 3a 35 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 69 6e 68 65 72 69 74 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 2d 2d 6c 70
                      Data Ascii: );transform:scaleX(-1);z-index:-1;top:50px;position:inherit}.container-content--lp{min-height:720px}.container-content--rp{min-height:820px}.container-content--rp .container-content__right,.container-content--rp .container-content__left{backgr
                      Dec 17, 2024 16:41:27.046250105 CET1236INData Raw: 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 6c 69 6e 6b 2c 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 76 69 73 69 74 65 64 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f
                      Data Ascii: ist-element-link:link,.two-tier-ads-list__list-element-link:visited{text-decoration:underline}.two-tier-ads-list__list-element-link:hover,.two-tier-ads-list__list-element-link:active,.two-tier-ads-list__list-element-link:focus{text-decoration:
                      Dec 17, 2024 16:41:27.166030884 CET1236INData Raw: 73 65 64 6f 70 61 72 6b 69 6e 67 2e 63 6f 6d 22 2c 22 61 64 62 6c 6f 63 6b 6b 65 79 22 3a 22 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e
                      Data Ascii: sedoparking.com","adblockkey":" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_TgGO/4IelHRqJvItjLquTHEvvvhUJuyEmQi7d8oHdbg/EzZSP1yuI/o8LOHaZ185fy


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.44974169.16.230.228802364C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      Dec 17, 2024 16:41:32.097323895 CET176OUTGET /oxgBR HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Cache-Control: no-cache
                      Host: ww99.cutit.org
                      Connection: Keep-Alive
                      Dec 17, 2024 16:41:33.261677027 CET276INHTTP/1.1 302 Moved Temporarily
                      Date: Tue, 17 Dec 2024 15:41:33 GMT
                      Content-Type: text/html
                      Content-Length: 0
                      Connection: keep-alive
                      Location: http://ww7.cutit.org/oxgBR?usid=27&utid=9975975645
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Access-Control-Allow-Origin: *


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.449743199.59.243.227802364C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      Dec 17, 2024 16:41:33.867597103 CET199OUTGET /oxgBR?usid=27&utid=9975975645 HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Cache-Control: no-cache
                      Connection: Keep-Alive
                      Host: ww7.cutit.org
                      Dec 17, 2024 16:41:34.983200073 CET1236INHTTP/1.1 200 OK
                      date: Tue, 17 Dec 2024 15:41:34 GMT
                      content-type: text/html; charset=utf-8
                      content-length: 1126
                      x-request-id: 6e11397e-7230-4150-bd0b-5a6938405d80
                      cache-control: no-store, max-age=0
                      accept-ch: sec-ch-prefers-color-scheme
                      critical-ch: sec-ch-prefers-color-scheme
                      vary: sec-ch-prefers-color-scheme
                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_f6hf8aoe7YnkfShKzAHBMGrQn3KlHRmUyZ+Edqykxt+NE6phqUSX62mLR6EnZXDDv/MJlCDhH6Lp6er0WreZOA==
                      set-cookie: parking_session=6e11397e-7230-4150-bd0b-5a6938405d80; expires=Tue, 17 Dec 2024 15:56:34 GMT; path=/
                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 66 36 68 66 38 61 6f 65 37 59 6e 6b 66 53 68 4b 7a 41 48 42 4d 47 72 51 6e 33 4b 6c 48 52 6d 55 79 5a 2b 45 64 71 79 6b 78 74 2b 4e 45 36 70 68 71 55 53 58 36 32 6d 4c 52 36 45 6e 5a 58 44 44 76 2f 4d 4a 6c 43 44 68 48 36 4c 70 36 65 72 30 57 72 65 5a 4f 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_f6hf8aoe7YnkfShKzAHBMGrQn3KlHRmUyZ+Edqykxt+NE6phqUSX62mLR6EnZXDDv/MJlCDhH6Lp6er0WreZOA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                      Dec 17, 2024 16:41:34.983254910 CET560INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                      Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNmUxMTM5N2UtNzIzMC00MTUwLWJkMGItNWE2OTM4NDA1ZDgwIiwicGFnZV90aW1lIjoxNzM0NDUwMDk0LCJwYWdlX3VybCI6I


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.449733172.232.31.1804435228C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      2024-12-17 15:41:22 UTC147OUTGET /oxgBR HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: cutit.org
                      Cache-Control: no-cache
                      2024-12-17 15:41:22 UTC318INHTTP/1.1 302 Moved Temporarily
                      Server: openresty
                      Date: Tue, 17 Dec 2024 15:41:22 GMT
                      Content-Type: text/html
                      Content-Length: 142
                      Connection: close
                      Accept-CH: Sec-CH-UA, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Mobile
                      Location: http://ww99.cutit.org/oxgBR
                      Cache-Control: no-store, max-age=0
                      2024-12-17 15:41:22 UTC142INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>openresty</center></body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.449731172.232.31.1804432364C:\Users\user\Desktop\htkeUc1zJ0.exe
                      TimestampBytes transferredDirectionData
                      2024-12-17 15:41:31 UTC147OUTGET /oxgBR HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                      Host: cutit.org
                      Cache-Control: no-cache
                      2024-12-17 15:41:31 UTC318INHTTP/1.1 302 Moved Temporarily
                      Server: openresty
                      Date: Tue, 17 Dec 2024 15:41:31 GMT
                      Content-Type: text/html
                      Content-Length: 142
                      Connection: close
                      Accept-CH: Sec-CH-UA, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Mobile
                      Location: http://ww99.cutit.org/oxgBR
                      Cache-Control: no-store, max-age=0
                      2024-12-17 15:41:31 UTC142INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>openresty</center></body></html>


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:10:41:07
                      Start date:17/12/2024
                      Path:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\htkeUc1zJ0.exe"
                      Imagebase:0x400000
                      File size:3'136'080 bytes
                      MD5 hash:64FBD4176CF9FB77D63173F809B2433D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:10:41:07
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:2
                      Start time:10:41:07
                      Start date:17/12/2024
                      Path:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      Imagebase:0x400000
                      File size:3'136'080 bytes
                      MD5 hash:7D77F1110DE8074096D1993EC3061470
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:3
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F
                      Imagebase:0xb20000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\1gG2smsf.xml
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:7
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks.exe /Query /XML /TN w3oN7Nlibd06
                      Imagebase:0xb20000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:10:41:08
                      Start date:17/12/2024
                      Path:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\htkeUc1zJ0.exe
                      Imagebase:0x400000
                      File size:3'136'080 bytes
                      MD5 hash:7D77F1110DE8074096D1993EC3061470
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:11
                      Start time:10:41:10
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:12
                      Start time:10:41:10
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 624
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:10:41:11
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\user\Desktop\htkeUc1zJ0.exe" /TN w3oN7Nlibd06 /F
                      Imagebase:0xb20000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:14
                      Start time:10:41:11
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:15
                      Start time:10:41:12
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /c schtasks.exe /Query /XML /TN w3oN7Nlibd06 > C:\Users\user\Desktop\dO0BLEiJk.xml
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:17
                      Start time:10:41:12
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 640
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:18
                      Start time:10:41:12
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:19
                      Start time:10:41:13
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks.exe /Query /XML /TN w3oN7Nlibd06
                      Imagebase:0xb20000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:21
                      Start time:10:41:14
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 648
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:10:41:15
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 752
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:25
                      Start time:10:41:16
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 728
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:27
                      Start time:10:41:18
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 768
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:30
                      Start time:10:41:20
                      Start date:17/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:31
                      Start time:10:41:20
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1500
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:33
                      Start time:10:41:22
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1980
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:37
                      Start time:10:43:17
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 744
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:39
                      Start time:10:43:27
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 712
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:41
                      Start time:10:43:29
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 956
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:43
                      Start time:10:44:28
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1960
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:45
                      Start time:10:44:29
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 612
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:47
                      Start time:10:44:30
                      Start date:17/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1224
                      Imagebase:0xc80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:2.2%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:2.3%
                        Total number of Nodes:517
                        Total number of Limit Nodes:16
                        execution_graph 51069 405ed0 51070 405edd 51069->51070 51073 405d30 GetProcessHeap HeapFree 51070->51073 51072 405f25 51073->51072 51074 4019e0 51081 405730 51074->51081 51080 4019ef 51082 4019e5 51081->51082 51083 405744 51081->51083 51085 4018b0 51082->51085 51083->51082 51115 4099a0 GetStartupInfoA 51083->51115 51087 4018c5 51085->51087 51086 401997 51243 404d00 51086->51243 51087->51086 51090 40190c 51087->51090 51186 40eb00 GetConsoleWindow ShowWindow 51087->51186 51089 40199c 51247 405040 51089->51247 51187 401520 51090->51187 51095 4019b1 51097 405040 5 API calls 51095->51097 51102 4019be 51097->51102 51100 40192e 51106 401947 51100->51106 51215 401630 51100->51215 51101 4019d0 51114 405a50 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51101->51114 51102->51101 51254 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51102->51254 51107 401961 51106->51107 51108 401966 DeleteFileA 51106->51108 51107->51108 51240 40a120 GetPEB 51108->51240 51110 40197b 51241 401820 GetOEMCP 51110->51241 51112 401983 51242 40a800 GetPEB 51112->51242 51114->51080 51116 4099c4 51115->51116 51117 4099b8 GetModuleHandleA 51115->51117 51129 409980 GetModuleHandleA GetModuleHandleA 51116->51129 51117->51116 51119 4099d8 51121 409a50 51119->51121 51171 4076b0 15 API calls 51119->51171 51130 409420 51121->51130 51123 409a64 51134 408f90 51123->51134 51129->51119 51131 40945a GetACP 51130->51131 51132 409432 51130->51132 51131->51123 51132->51131 51172 403da0 7 API calls 51132->51172 51135 408fa8 51134->51135 51136 408f9c GetStdHandle 51134->51136 51137 408fb1 GetStdHandle 51135->51137 51138 408fbd 51135->51138 51136->51135 51137->51138 51139 408fd2 51138->51139 51140 408fc6 GetStdHandle 51138->51140 51141 409084 51139->51141 51142 408fdf 51139->51142 51140->51139 51178 4084d0 14 API calls 51141->51178 51173 408f70 15 API calls 51142->51173 51145 408ffc 51174 408f70 15 API calls 51145->51174 51146 4090ac 51179 4084d0 14 API calls 51146->51179 51149 4090d4 51180 4084d0 14 API calls 51149->51180 51150 409019 51175 407f80 14 API calls 51150->51175 51153 40903b 51176 407f80 14 API calls 51153->51176 51154 4090fc 51181 4084d0 14 API calls 51154->51181 51157 409124 51159 40907f 51157->51159 51182 4084d0 14 API calls 51157->51182 51158 40905d 51177 407f80 14 API calls 51158->51177 51162 408bb0 GetModuleFileNameA 51159->51162 51183 408d90 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51162->51183 51164 408c0b 51165 408c26 GetCommandLineA 51164->51165 51169 408c40 51165->51169 51166 408d59 51185 406c80 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51166->51185 51168 408d75 GetCurrentProcessId 51168->51083 51169->51166 51184 408d90 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51169->51184 51171->51121 51172->51132 51173->51145 51174->51150 51175->51153 51176->51158 51177->51159 51178->51146 51179->51149 51180->51154 51181->51157 51182->51159 51183->51164 51184->51169 51185->51168 51186->51090 51188 401556 51187->51188 51189 4015fa 51188->51189 51255 4038a0 51188->51255 51191 404d00 4 API calls 51189->51191 51202 4015ff 51191->51202 51192 401575 51193 401581 51192->51193 51194 401586 GetModuleFileNameA 51192->51194 51193->51194 51259 40aed0 GetOEMCP 51194->51259 51196 401599 51260 40aaf0 GetOEMCP 51196->51260 51198 4015a4 51261 40af20 GetOEMCP 51198->51261 51200 4015af 51262 40aaf0 GetOEMCP 51200->51262 51204 401629 51202->51204 51265 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51202->51265 51203 4015ba 51263 403010 13 API calls 51203->51263 51209 4053d0 51204->51209 51207 4015d4 51264 403280 13 API calls 51207->51264 51266 405180 51209->51266 51211 401926 51212 40afc0 51211->51212 51213 40afd6 51212->51213 51214 40afdb FindFirstFileA FindClose 51212->51214 51213->51214 51214->51100 51218 40166f 51215->51218 51216 4017e4 51217 404d00 4 API calls 51216->51217 51221 4017e9 51217->51221 51218->51216 51219 4016bb MoveFileA 51218->51219 51220 4016d0 51219->51220 51298 403800 51220->51298 51222 40181b GetCurrentProcess TerminateProcess 51221->51222 51360 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51221->51360 51222->51106 51225 4016e7 51226 403800 11 API calls 51225->51226 51227 401712 51226->51227 51228 401738 CopyFileA 51227->51228 51306 40b000 51228->51306 51230 40174f 51327 40e9e0 51230->51327 51232 4017c3 51341 40b0f0 51232->51341 51236 4017d7 GetCurrentProcess TerminateProcess 51236->51216 51238 401762 51238->51232 51239 403010 13 API calls 51238->51239 51359 409ba0 12 API calls 51238->51359 51239->51238 51240->51110 51241->51112 51242->51086 51244 404d0b 51243->51244 51245 404d2a 51244->51245 51648 405a60 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51244->51648 51245->51089 51248 405050 51247->51248 51249 405074 51247->51249 51248->51249 51250 40508c 51248->51250 51252 405058 51248->51252 51249->51095 51251 403d30 SysFreeString 51250->51251 51251->51249 51252->51249 51253 4045e0 5 API calls 51252->51253 51253->51249 51254->51101 51256 4038bb 51255->51256 51258 4038e6 51255->51258 51257 4038dc GetOEMCP 51256->51257 51256->51258 51257->51258 51258->51192 51259->51196 51260->51198 51261->51200 51262->51203 51263->51207 51264->51189 51265->51204 51267 4051aa 51266->51267 51271 4051e6 51266->51271 51268 405204 51267->51268 51269 4051b4 51267->51269 51267->51271 51279 403da0 7 API calls 51268->51279 51269->51271 51272 4051c2 51269->51272 51273 40522c 51269->51273 51271->51211 51272->51271 51274 4051dd 51272->51274 51275 4052b8 51272->51275 51273->51271 51276 405180 7 API calls 51273->51276 51274->51271 51280 4046c0 51274->51280 51275->51271 51278 405180 7 API calls 51275->51278 51276->51273 51278->51275 51279->51271 51285 404680 51280->51285 51282 4046d0 51289 4045e0 51282->51289 51284 4046d9 51284->51271 51286 404688 51285->51286 51287 4046a3 51285->51287 51286->51287 51295 405b20 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51286->51295 51287->51282 51290 4045fb 51289->51290 51294 40465d 51289->51294 51291 40461d 51290->51291 51296 405b20 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51290->51296 51291->51294 51297 4053e0 SysFreeString GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51291->51297 51294->51284 51295->51287 51296->51291 51297->51294 51301 403815 51298->51301 51299 4038a0 GetOEMCP 51300 403845 51299->51300 51302 403891 51300->51302 51303 40385e GetOEMCP 51300->51303 51304 403868 51300->51304 51301->51299 51302->51225 51303->51304 51361 403bf0 10 API calls 51304->51361 51307 40b009 51306->51307 51307->51307 51362 408590 51307->51362 51316 4056f0 4 API calls 51317 40b061 51316->51317 51318 4038a0 GetOEMCP 51317->51318 51321 40b072 51318->51321 51320 4056f0 4 API calls 51320->51321 51321->51320 51322 40b0d0 51321->51322 51382 408990 51321->51382 51385 408a60 51322->51385 51325 4056f0 4 API calls 51326 40b0e0 51325->51326 51326->51230 51333 40ea03 51327->51333 51328 40ea9c 51329 404d00 4 API calls 51328->51329 51331 40eaa1 51329->51331 51330 40eab3 51330->51238 51331->51330 51484 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51331->51484 51333->51328 51469 40ae00 51333->51469 51335 40ea6d 51472 40e780 51335->51472 51339 40ea95 51483 40e860 17 API calls 51339->51483 51342 40b0f9 51341->51342 51342->51342 51343 408590 7 API calls 51342->51343 51344 40b12a 51343->51344 51629 4085e0 51344->51629 51347 4056f0 4 API calls 51348 40b13f 51347->51348 51350 4056f0 4 API calls 51348->51350 51351 40b1e4 51348->51351 51635 408860 51348->51635 51350->51348 51352 408a60 2 API calls 51351->51352 51353 40b1ef 51352->51353 51354 4056f0 4 API calls 51353->51354 51355 4017cd 51354->51355 51356 4014b0 51355->51356 51357 4014c8 51356->51357 51358 4014fc CreateProcessA CloseHandle CloseHandle 51357->51358 51358->51236 51359->51238 51360->51222 51361->51302 51363 4085a5 51362->51363 51389 404280 51363->51389 51366 4086a0 51367 4086b3 51366->51367 51368 4086f3 51367->51368 51369 40871a 51367->51369 51371 408a60 2 API calls 51367->51371 51368->51369 51426 407ae0 51368->51426 51372 4056f0 51369->51372 51371->51368 51374 4056fe 51372->51374 51373 40572d 51376 4089c0 51373->51376 51374->51373 51445 405b20 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51374->51445 51377 4089dc 51376->51377 51378 408a2a 51377->51378 51446 407aa0 51377->51446 51378->51316 51462 408890 51382->51462 51386 408a6d 51385->51386 51387 408aa4 51386->51387 51388 407900 2 API calls 51386->51388 51387->51325 51388->51387 51390 4042a8 51389->51390 51395 4042fd 51390->51395 51396 4042e8 51390->51396 51398 4042de GetOEMCP 51390->51398 51391 404d00 4 API calls 51392 404349 51391->51392 51412 403d30 51392->51412 51394 404351 51397 40435b 51394->51397 51416 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51394->51416 51395->51391 51401 403e30 51396->51401 51397->51366 51398->51396 51402 403ef4 51401->51402 51403 403e3f 51401->51403 51404 403d30 SysFreeString 51402->51404 51405 403e52 51403->51405 51406 403e44 51403->51406 51409 403e4b 51404->51409 51408 403cd0 5 API calls 51405->51408 51405->51409 51417 403cd0 51406->51417 51411 403e8a 51408->51411 51409->51395 51410 403d30 SysFreeString 51410->51409 51411->51410 51413 403d3b 51412->51413 51414 403d4d 51412->51414 51413->51414 51415 403d44 SysFreeString 51413->51415 51414->51394 51415->51414 51416->51397 51418 403ce3 SysAllocStringLen 51417->51418 51421 403cf9 51417->51421 51419 403cf2 51418->51419 51422 403cf7 51418->51422 51424 403cb0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51419->51424 51421->51422 51425 403cb0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51421->51425 51422->51409 51424->51422 51425->51422 51428 407afe 51426->51428 51430 407b28 51426->51430 51427 407b2c 51427->51369 51428->51427 51428->51430 51436 407900 51428->51436 51430->51427 51431 407ca9 CreateFileW 51430->51431 51432 407ce6 51431->51432 51433 407d01 51431->51433 51432->51433 51441 407a60 SetFilePointer 51432->51441 51433->51427 51434 407d1c GetLastError 51433->51434 51434->51427 51437 40790b 51436->51437 51438 40790f CloseHandle 51437->51438 51440 407923 51437->51440 51439 407919 GetLastError 51438->51439 51438->51440 51439->51440 51440->51430 51442 407a84 GetLastError 51441->51442 51443 407a97 51441->51443 51442->51443 51444 407a8d GetLastError 51442->51444 51443->51433 51444->51443 51445->51373 51447 407ab1 51446->51447 51454 4079e0 SetFilePointer 51446->51454 51449 407a60 3 API calls 51447->51449 51450 407ac0 51449->51450 51458 407a20 SetFilePointer 51450->51458 51452 407ad3 51453 402c90 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51452->51453 51453->51378 51455 407a04 GetLastError 51454->51455 51456 407a17 51454->51456 51455->51456 51457 407a0d GetLastError 51455->51457 51456->51447 51457->51456 51459 407a42 GetLastError 51458->51459 51460 407a55 51458->51460 51459->51460 51461 407a4b GetLastError 51459->51461 51460->51452 51461->51460 51463 4088c5 51462->51463 51465 408929 51463->51465 51466 4079b0 ReadFile 51463->51466 51465->51321 51467 4079d4 51466->51467 51468 4079ca GetLastError 51466->51468 51467->51465 51468->51467 51470 4038a0 GetOEMCP 51469->51470 51471 40ae15 51470->51471 51471->51335 51473 40e7a9 51472->51473 51474 40e823 51473->51474 51476 40ae00 GetOEMCP 51473->51476 51475 404d00 4 API calls 51474->51475 51477 40e847 51475->51477 51480 40e7c4 51476->51480 51478 40e859 51477->51478 51574 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51477->51574 51482 40e6b0 17 API calls 51478->51482 51485 40e030 51480->51485 51482->51339 51483->51328 51484->51330 51486 40e0ac 51485->51486 51487 40e3f2 51486->51487 51489 4045e0 5 API calls 51486->51489 51488 404d00 4 API calls 51487->51488 51500 40e3f7 51488->51500 51490 40e0d5 51489->51490 51575 4046e0 51490->51575 51493 4046c0 5 API calls 51494 40e10e 51493->51494 51593 40aa40 51494->51593 51497 40aa40 6 API calls 51498 40e121 51497->51498 51499 40aa40 6 API calls 51498->51499 51501 40e12b 51499->51501 51502 4045e0 5 API calls 51500->51502 51503 40aa40 6 API calls 51501->51503 51504 40e42c 51502->51504 51505 40e136 51503->51505 51506 405040 5 API calls 51504->51506 51597 40a8e0 51505->51597 51508 40e439 51506->51508 51510 405040 5 API calls 51508->51510 51509 40e149 51601 40dee0 17 API calls 51509->51601 51512 40e446 51510->51512 51514 40e450 51512->51514 51620 404dc0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51512->51620 51513 40e151 51515 40a8e0 6 API calls 51513->51515 51514->51474 51517 40e15c 51515->51517 51602 40d880 20 API calls 51517->51602 51519 40e167 51520 40a8e0 6 API calls 51519->51520 51521 40e172 51520->51521 51603 40b200 14 API calls 51521->51603 51523 40e184 51604 40b600 14 API calls 51523->51604 51525 40e191 51526 40a8e0 6 API calls 51525->51526 51527 40e19c 51526->51527 51605 40b200 14 API calls 51527->51605 51529 40e1ab 51606 40b600 14 API calls 51529->51606 51531 40e1b7 51532 40a8e0 6 API calls 51531->51532 51533 40e1c2 51532->51533 51607 40b200 14 API calls 51533->51607 51535 40e1d3 51608 40b600 14 API calls 51535->51608 51537 40e1e0 51538 40a8e0 6 API calls 51537->51538 51539 40e1eb 51538->51539 51609 40cc70 20 API calls 51539->51609 51541 40e207 51542 40a8e0 6 API calls 51541->51542 51543 40e212 51542->51543 51610 40d030 17 API calls 51543->51610 51545 40e223 51546 40a8e0 6 API calls 51545->51546 51547 40e22e 51546->51547 51611 40ad70 GetOEMCP 51547->51611 51549 40e24b 51612 403280 13 API calls 51549->51612 51551 40e274 51552 40e2de 51551->51552 51558 403010 13 API calls 51551->51558 51613 40c220 17 API calls 51551->51613 51553 4045e0 5 API calls 51552->51553 51554 40e2eb 51553->51554 51555 4046e0 6 API calls 51554->51555 51557 40e308 51555->51557 51614 40b200 14 API calls 51557->51614 51558->51551 51560 40e34b 51615 40b600 14 API calls 51560->51615 51562 40e35b 51616 40b5a0 11 API calls 51562->51616 51564 40e36f 51565 4045e0 5 API calls 51564->51565 51566 40e382 51565->51566 51567 4046e0 6 API calls 51566->51567 51568 40e39f 51567->51568 51617 40c5e0 17 API calls 51568->51617 51570 40e3be 51618 403280 13 API calls 51570->51618 51572 40e3dc 51619 403010 13 API calls 51572->51619 51574->51478 51576 404714 51575->51576 51577 4046fd 51575->51577 51579 40478e 51576->51579 51580 40477f 51576->51580 51589 404746 51576->51589 51621 405b20 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51577->51621 51578 404789 51578->51493 51583 4047a8 51579->51583 51585 40483d 51579->51585 51581 4045e0 5 API calls 51580->51581 51581->51578 51590 40482e 51583->51590 51622 4050e0 SysAllocStringLen GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51583->51622 51584 40487c 51584->51589 51624 4053e0 SysFreeString GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51584->51624 51585->51584 51585->51589 51623 405b20 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51585->51623 51587 4046e0 6 API calls 51587->51589 51589->51578 51589->51587 51591 4045e0 5 API calls 51590->51591 51591->51589 51594 40aa4a 51593->51594 51625 40a860 51594->51625 51598 40a8f4 51597->51598 51599 4046e0 6 API calls 51598->51599 51600 40a915 51599->51600 51600->51509 51601->51513 51602->51519 51603->51523 51604->51525 51605->51529 51606->51531 51607->51535 51608->51537 51609->51541 51610->51545 51611->51549 51612->51551 51613->51551 51614->51560 51615->51562 51616->51564 51617->51570 51618->51572 51619->51487 51620->51514 51621->51576 51622->51583 51623->51584 51624->51589 51626 40a874 51625->51626 51626->51626 51627 4046e0 6 API calls 51626->51627 51628 40a8b9 51627->51628 51628->51497 51632 4085f3 51629->51632 51630 408637 51630->51347 51631 408633 51631->51630 51633 407ae0 7 API calls 51631->51633 51632->51630 51632->51631 51634 408a60 2 API calls 51632->51634 51633->51630 51634->51631 51638 408760 51635->51638 51640 408795 51638->51640 51639 4087f9 51639->51348 51640->51639 51642 407930 WriteFile 51640->51642 51643 40795b 51642->51643 51644 40794f GetLastError 51642->51644 51645 407962 GetConsoleMode 51643->51645 51647 407959 51643->51647 51644->51647 51646 407970 GetConsoleOutputCP 51645->51646 51645->51647 51646->51647 51647->51639 51648->51245 51649 4093e1 51650 4093f4 GetACP 51649->51650 51651 4093e5 51649->51651 51654 409410 51650->51654 51652 4093ea 51651->51652 51653 4093fe GetConsoleCP 51651->51653 51655 409408 GetConsoleOutputCP 51652->51655 51656 4093ef 51652->51656 51653->51654 51655->51654 51656->51650 51656->51654 51657 406712 51658 406714 51657->51658 51660 406757 51658->51660 51661 406230 51658->51661 51665 406254 51661->51665 51662 406429 51673 406413 51662->51673 51692 405b80 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51662->51692 51663 406382 51684 405d10 GetProcessHeap HeapAlloc 51663->51684 51664 4063a4 51667 4063c9 51664->51667 51668 4063af 51664->51668 51683 4062cd 51665->51683 51686 406a00 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51665->51686 51669 4063d4 51667->51669 51670 4063ee 51667->51670 51688 405d10 GetProcessHeap HeapAlloc 51668->51688 51689 405d10 GetProcessHeap HeapAlloc 51669->51689 51685 405d10 GetProcessHeap HeapAlloc 51670->51685 51673->51660 51674 406390 51674->51662 51690 405d10 GetProcessHeap HeapAlloc 51674->51690 51677 4062c3 51687 406a70 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51677->51687 51681 406404 51681->51662 51681->51673 51691 405b80 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51681->51691 51683->51662 51683->51663 51683->51664 51684->51674 51685->51674 51686->51677 51687->51683 51688->51674 51689->51674 51690->51681 51691->51662 51692->51673 51693 25060dd0 51694 25060de6 51693->51694 51695 25060de8 51693->51695 51706 25060d90 51694->51706 51699 25060e08 51718 25060ae0 51699->51718 51707 25060da6 NtUnmapViewOfSection 51706->51707 51708 25060db4 51707->51708 51709 25060750 51708->51709 51710 250607a2 51709->51710 51711 25060801 VirtualAlloc 51710->51711 51713 2506081f VirtualAlloc 51711->51713 51717 2506085e 51713->51717 51714 25060968 51714->51699 51715 2506091e VirtualAlloc 51715->51717 51716 250608f6 VirtualAlloc 51716->51717 51717->51714 51717->51715 51717->51716 51719 25060cb0 51718->51719 51720 25060b76 51718->51720 51722 25060cc0 51719->51722 51720->51719 51721 25060c94 VirtualProtect 51720->51721 51721->51720 51723 25060cfc 51722->51723 51724 25060cfa 51722->51724 51726 25060d50 51723->51726 51724->51723 51729 4071b0 51724->51729 51756 40ebb0 GetStdHandle GetConsoleMode 51726->51756 51730 4071b8 51729->51730 51734 4071f0 GetLastError 51730->51734 51743 4071ef GetLastError 51730->51743 51731 4071be 51731->51724 51735 407205 51734->51735 51736 40720e TlsGetValue 51734->51736 51752 405ba0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51735->51752 51738 407247 SetLastError 51736->51738 51739 40721f LocalAlloc 51736->51739 51738->51731 51740 407232 51739->51740 51741 40723b TlsSetValue 51739->51741 51753 405ba0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51740->51753 51741->51738 51744 407205 51743->51744 51745 40720e TlsGetValue 51743->51745 51754 405ba0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51744->51754 51747 407247 SetLastError 51745->51747 51748 40721f LocalAlloc 51745->51748 51747->51731 51749 407232 51748->51749 51750 40723b TlsSetValue 51748->51750 51755 405ba0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 51749->51755 51750->51747 51752->51736 51753->51741 51754->51745 51755->51750 51757 40ebe0 51756->51757 51760 4095e0 ExitProcess SetUnhandledExceptionFilter SetUnhandledExceptionFilter 51757->51760 51759 40ebef 51760->51759
                        APIs
                        • FindFirstFileA.KERNEL32(?,?,00410024,?,0040192E,00000000), ref: 0040AFDC
                        • FindClose.KERNEL32(00000000,?,?,00410024,?,0040192E,00000000), ref: 0040AFE8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 264355e3e8b815cdf9856663946e8b1257f5a1820ae23b1aa361fd361f66df6e
                        • Instruction ID: 182c4f449604cd8701b2f6086798223e659f71b34f18cd9cbeb3da7b431b610d
                        • Opcode Fuzzy Hash: 264355e3e8b815cdf9856663946e8b1257f5a1820ae23b1aa361fd361f66df6e
                        • Instruction Fuzzy Hash: 34D0A7B244020613CB2225BA1C429CF725C5B4435CF004AABF626F31E1F578DAA1566A
                        APIs
                        • GetProcessHeap.KERNEL32(00000000), ref: 00405D16
                        • HeapAlloc.KERNEL32(00000000,00000000), ref: 00405D1C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Heap$AllocProcess
                        • String ID:
                        • API String ID: 1617791916-0
                        • Opcode ID: 10f4a4ba6531a16ec15440a2eee764e12e1657af5e81f9b6292e6c69fff65db4
                        • Instruction ID: adaa604e1fb5df6027f44fbf860c70f94d50311257def816e168e2630a19bc6c
                        • Opcode Fuzzy Hash: 10f4a4ba6531a16ec15440a2eee764e12e1657af5e81f9b6292e6c69fff65db4
                        • Instruction Fuzzy Hash: 92B0026055430875D54472F75C07F17754C474D7DDF400465B705B91D258E9E800007D
                        APIs
                        • NtUnmapViewOfSection.NTDLL(00000000), ref: 25060DAA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmp, Offset: 25060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_25060000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: SectionUnmapView
                        • String ID:
                        • API String ID: 498011366-0
                        • Opcode ID: 4cca3a47c6304341ef6ad52500da315c198373a34e12e4e21516510892914467
                        • Instruction ID: 443c8e08d5129817594f7d87a8c928af45a3a86a57915a136aa5a407586a9672
                        • Opcode Fuzzy Hash: 4cca3a47c6304341ef6ad52500da315c198373a34e12e4e21516510892914467
                        • Instruction Fuzzy Hash: E3E04579A40508EFDB40DBA8DA49E8DB7F4AF08624F214291E915A72A1C770AF10AB41

                        Control-flow Graph

                        APIs
                        • GetStartupInfoA.KERNEL32(00412260), ref: 004099AA
                        • GetModuleHandleA.KERNEL32(00000000), ref: 004099BA
                        • GetCurrentProcessId.KERNEL32 ref: 00409A8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CurrentHandleInfoModuleProcessStartup
                        • String ID: T!A$`"A$d!A$t!A$t!A
                        • API String ID: 4098904731-1730669794
                        • Opcode ID: 375731fd3a348e47719edc4832d73a6053ada0a31575ebed95e0f35fca7b0b06
                        • Instruction ID: 24e5537fc4617142d7940d560acc731aabe64a9e39779d968f32d669ac1cad7c
                        • Opcode Fuzzy Hash: 375731fd3a348e47719edc4832d73a6053ada0a31575ebed95e0f35fca7b0b06
                        • Instruction Fuzzy Hash: FB2139B07042409FC700FBA9EA4175A32A1FB85304B20C17EE540EB3A6EBBC9D519B5D

                        Control-flow Graph

                        APIs
                        • GetLastError.KERNEL32 ref: 004071F5
                        • TlsGetValue.KERNEL32 ref: 00407214
                        • LocalAlloc.KERNEL32(00000040), ref: 00407227
                        • TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                        • SetLastError.KERNEL32(00000000), ref: 00407248
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: f9f260e169530cd1e8a645bc3d8cdfa4aa173e230d5899aae331620e9e485a93
                        • Instruction ID: 79aa1d04de2189fcbb2a88b98389bb8232e742d56cdc7f1e9f9aac7ae7530a8b
                        • Opcode Fuzzy Hash: f9f260e169530cd1e8a645bc3d8cdfa4aa173e230d5899aae331620e9e485a93
                        • Instruction Fuzzy Hash: 1DE06C3184052916C63337765C02A5B35589B143ECF40067EFA50BA6F6C67DAC415AEE

                        Control-flow Graph

                        APIs
                        • GetLastError.KERNEL32 ref: 004071F5
                        • TlsGetValue.KERNEL32 ref: 00407214
                        • LocalAlloc.KERNEL32(00000040), ref: 00407227
                        • TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                        • SetLastError.KERNEL32(00000000), ref: 00407248
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: 2c92e8215e6b271c397db60445afd1c1126fc9a5c01a701e244d35db31d71ccd
                        • Instruction ID: cc8325b4cb0aee0d201a36aa6d6a7c5f81572539e0f924db0b653e8730ffa3e6
                        • Opcode Fuzzy Hash: 2c92e8215e6b271c397db60445afd1c1126fc9a5c01a701e244d35db31d71ccd
                        • Instruction Fuzzy Hash: E3F0A73184052916C73333B66C02A5F25146B143ACB40027EFA50BA6F2C63CA8014A9E

                        Control-flow Graph

                        APIs
                        • MoveFileA.KERNEL32(00000000,00000000), ref: 004016BC
                        • CopyFileA.KERNEL32(00000000,00000000,000000FF), ref: 00401739
                        • GetCurrentProcess.KERNEL32(00000000,00000000,?,?,00410024,?,0040193A,00000000), ref: 004017D9
                        • TerminateProcess.KERNEL32(00000000,00000000,00000000,?,?,00410024,?,0040193A,00000000), ref: 004017DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: FileProcess$CopyCurrentMoveTerminate
                        • String ID:
                        • API String ID: 1606378885-0
                        • Opcode ID: e6ce16b44740cf471d0ca28f8654ee1a0bfd9079a37d1f1afd64768f9b5409a0
                        • Instruction ID: f565ddde79c8a1d5ed21fb69624d6dd4940238b806e7322889341e95c1edabf9
                        • Opcode Fuzzy Hash: e6ce16b44740cf471d0ca28f8654ee1a0bfd9079a37d1f1afd64768f9b5409a0
                        • Instruction Fuzzy Hash: 9151E430A00109ABDB00FBA5D985BCEB7B9AF40348F50443BF410F76E5EB78AE459B58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 140 407930-40794d WriteFile 141 40795b-407960 140->141 142 40794f-407959 GetLastError call 401a00 140->142 144 407962-40796e GetConsoleMode 141->144 145 4079a6-4079ac 141->145 142->145 144->145 147 407970-40797c GetConsoleOutputCP 144->147 148 40797e-407983 147->148 149 40799f-4079a1 147->149 150 407985-40798a 148->150 151 40799d 148->151 149->145 152 4079a3 149->152 150->149 153 40798c-40798f 150->153 151->149 152->145 153->151 154 407991-407996 153->154 154->149 155 407998-40799b 154->155 155->149 155->151
                        APIs
                        • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407946
                        • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 0040794F
                        • GetConsoleMode.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407967
                        • GetConsoleOutputCP.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407972
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Console$ErrorFileLastModeOutputWrite
                        • String ID:
                        • API String ID: 1666348767-0
                        • Opcode ID: c24d398facfc1137c2022cb5bc32fead67017635c1672130c16bbe57c72be3d2
                        • Instruction ID: f809d50ad608efa7b459c8b2bab34e2f28fa3466cc252dc82699dd7388dc9cd3
                        • Opcode Fuzzy Hash: c24d398facfc1137c2022cb5bc32fead67017635c1672130c16bbe57c72be3d2
                        • Instruction Fuzzy Hash: 5B012BF1E191016AF710A5BE8A45EAEF69DCB05344F141077F540F22C6E63CEE00425F

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 156 407ae0-407afc 157 407b4e-407b7e call 407830 156->157 158 407afe-407b0a 156->158 166 407b80-407b8b 157->166 167 407bd5-407bda 157->167 160 407b2c-407b34 158->160 161 407b0c-407b12 158->161 164 407b36-407b3d 160->164 165 407b3f 160->165 161->157 163 407b14-407b17 161->163 163->160 168 407b19-407b1c 163->168 169 407b44-407b49 164->169 165->169 171 407b9c-407ba1 166->171 172 407b8d-407b9a 166->172 174 407bdc-407bde 167->174 175 407c1d-407c25 167->175 168->160 173 407b1e-407b28 call 407900 168->173 170 407d40-407d44 169->170 171->167 172->171 179 407ba3-407bb4 172->179 173->157 181 407be0-407be3 174->181 182 407bec-407bfb 174->182 177 407c27-407c2c 175->177 178 407c2e 175->178 183 407c33-407c3b 177->183 178->183 184 407bb6-407bbb 179->184 185 407bbd-407bce 179->185 187 407be5-407be8 181->187 188 407bfd-407c0c 181->188 182->175 189 407ca9-407ce4 CreateFileW 183->189 190 407c3d-407c49 183->190 184->167 185->167 191 407bd0 185->191 192 407bea 187->192 193 407c0e-407c18 187->193 188->175 194 407ce6-407ced 189->194 195 407d0b-407d12 189->195 190->170 196 407c4f-407c55 190->196 191->167 192->175 193->175 194->195 197 407cef-407cf5 194->197 198 407d14-407d1a 195->198 199 407d1c-407d29 GetLastError call 401a00 195->199 200 407c57-407c5a 196->200 201 407c6f-407c7a 196->201 197->195 202 407cf7-407d04 call 407a60 197->202 198->199 203 407d30-407d36 198->203 199->203 200->170 205 407c60-407c63 200->205 201->170 202->195 203->170 210 407d38-407d3b call 405d70 203->210 208 407c65-407c68 205->208 209 407c7f-407c8a 205->209 212 407c6a 208->212 213 407c8f-407ca4 208->213 209->170 210->170 212->170 213->170
                        APIs
                          • Part of subcall function 00407900: CloseHandle.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407910
                          • Part of subcall function 00407900: GetLastError.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407919
                        • CreateFileW.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,0040874C,00000000,?,00410024,?), ref: 00407CD3
                        • GetLastError.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,0040874C,00000000,?,00410024,?), ref: 00407D1C
                          • Part of subcall function 00407A60: SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A77
                          • Part of subcall function 00407A60: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A84
                          • Part of subcall function 00407A60: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$File$CloseCreateHandlePointer
                        • String ID: T!A
                        • API String ID: 3997052936-430979995
                        • Opcode ID: d2b57f730ca305837f798fd35f389acfd171718314921edf5c31533d822b112f
                        • Instruction ID: e2816ed792d6084e43ad8c237f8fb12c3b16bfbfdd1f40ff2fd2351da7ec3545
                        • Opcode Fuzzy Hash: d2b57f730ca305837f798fd35f389acfd171718314921edf5c31533d822b112f
                        • Instruction Fuzzy Hash: F4614D75E0810A8BD711DF54CA847ABB7B2FB84314F248176D504BB798D338BD46CBAA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 215 25060ae0-25060b70 216 25060b76-25060b7a 215->216 217 25060cb0-25060cb4 215->217 218 25060b7c-25060bae 216->218 219 25060bb2 218->219 220 25060bb0-25060bca 218->220 222 25060ca7-25060caa 219->222 223 25060bce-25060bdf 220->223 224 25060bcc-25060bf1 220->224 222->217 222->218 223->222 227 25060bf5-25060bfc 224->227 228 25060bf3-25060bfe 224->228 230 25060c05-25060c12 227->230 228->230 231 25060c16-25060c1d 230->231 232 25060c14-25060c1f 230->232 233 25060c26-25060c33 231->233 232->233 235 25060c37-25060c3e 233->235 236 25060c35-25060c40 233->236 238 25060c47-25060c54 235->238 236->238 239 25060c56-25060c61 238->239 240 25060c58-25060c5f 238->240 242 25060c68-25060c85 239->242 240->242 243 25060c87 242->243 244 25060c89-25060c91 242->244 245 25060c94-25060ca4 VirtualProtect 243->245 244->245 245->222
                        APIs
                        • VirtualProtect.KERNELBASE(?,00000000,?,?), ref: 25060CA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmp, Offset: 25060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_25060000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: $@
                        • API String ID: 544645111-1077428164
                        • Opcode ID: 8da9aaa85e53ea795af5dde6ce71bfcab3bb53e2cf580596c0c423cd196b6745
                        • Instruction ID: 5a937c9ee4e93f7ecad801b3a463b929e931825db4f5ba4514407e7149125bf9
                        • Opcode Fuzzy Hash: 8da9aaa85e53ea795af5dde6ce71bfcab3bb53e2cf580596c0c423cd196b6745
                        • Instruction Fuzzy Hash: C451AF71944209DFEB00CF98E9A5FEDBBF5BB08328F204259E514BB290D375AE84DB50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 246 25060750-250607a0 247 250607a2-250607a6 246->247 248 250607f3-2506081d call 250602a0 VirtualAlloc 246->248 249 250607a8-250607c2 247->249 257 25060821-25060832 248->257 258 2506081f 248->258 251 250607c6-250607d8 249->251 252 250607c4 249->252 255 250607dc-250607eb 251->255 256 250607da 251->256 254 250607ee-250607f1 252->254 254->248 254->249 255->254 256->254 259 25060835-250608a4 VirtualAlloc call 250602f0 257->259 258->259 263 250608aa-250608ae 259->263 264 25060968-2506096a 259->264 265 250608b0-250608ca 263->265 266 250608d1-250608e7 265->266 267 250608cc 265->267 269 250608eb-250608f2 266->269 270 250608e9-25060951 VirtualAlloc call 250602f0 266->270 268 2506095f-25060962 267->268 268->264 268->265 272 250608f6-25060917 VirtualAlloc call 25060000 269->272 273 250608f4 269->273 277 25060956-2506095c 270->277 274 2506091c 272->274 273->274 274->277 277->268
                        APIs
                        • VirtualAlloc.KERNELBASE(?,00000000,00003000,00000040), ref: 25060814
                        • VirtualAlloc.KERNELBASE(?,?,00001000,00000040), ref: 25060848
                        • VirtualAlloc.KERNELBASE(?,?,00001000,00000040), ref: 25060909
                        • VirtualAlloc.KERNELBASE(?,00000000,00001000,00000040), ref: 25060931
                        Memory Dump Source
                        • Source File: 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmp, Offset: 25060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_25060000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: b8912a2b325773f6e54ae37cc4d2ec56c7b2a849bf496345d687ee8ba71d3a2e
                        • Instruction ID: 656447c578355dffe6eb7d42aceac357f71f30145a75132baa8884d7b485d0ac
                        • Opcode Fuzzy Hash: b8912a2b325773f6e54ae37cc4d2ec56c7b2a849bf496345d687ee8ba71d3a2e
                        • Instruction Fuzzy Hash: 83918E74E4020ADFCB40CF98D995EAEBBB1FF48314F108195E914AB365D374AA85DF90

                        Control-flow Graph

                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,00000000), ref: 0040193C
                        • TerminateProcess.KERNEL32(00000000,00000000,00000000), ref: 00401942
                        • DeleteFileA.KERNEL32(00000000,00000000), ref: 00401967
                          • Part of subcall function 0040EB00: GetConsoleWindow.KERNEL32(00000000,?,0040190C,00000000), ref: 0040EB05
                          • Part of subcall function 0040EB00: ShowWindow.USER32(00000000,00000000,?,0040190C,00000000), ref: 0040EB0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ProcessWindow$ConsoleCurrentDeleteFileShowTerminate
                        • String ID:
                        • API String ID: 1545351087-0
                        • Opcode ID: 6e9cc5116de167b69cde142408c86a3b87c19ba6c24419fe4ecc35e2fa308a1e
                        • Instruction ID: 125de767535d2f655fb1e11050f55bfa4ec1d60831635f95fae4489aaf5df2a8
                        • Opcode Fuzzy Hash: 6e9cc5116de167b69cde142408c86a3b87c19ba6c24419fe4ecc35e2fa308a1e
                        • Instruction Fuzzy Hash: 7431E1709001099ADB10FBB2D451ACEB7B8AF44348F50847FB510B76D6EB7C9A898E59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 330 4014b0-4014e9 call 40a840 * 2 335 4014f0-4014f5 330->335 336 4014eb 330->336 337 4014f7 335->337 338 4014fc-401515 CreateProcessA CloseHandle * 2 335->338 336->335 337->338
                        APIs
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044,?,00410024), ref: 004014FD
                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044), ref: 00401505
                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044), ref: 0040150D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CloseHandle$CreateProcess
                        • String ID:
                        • API String ID: 2922976086-0
                        • Opcode ID: ad3a4d96b4dbe5c50b2d21442d210189eb664e480efe298641d26d5e35f6ef01
                        • Instruction ID: 6bbd9ebbbd4d45c4dd66238c12e6fca75e148d4a72f49018ed9ed4a492255b42
                        • Opcode Fuzzy Hash: ad3a4d96b4dbe5c50b2d21442d210189eb664e480efe298641d26d5e35f6ef01
                        • Instruction Fuzzy Hash: 63F0547294021967DB10E6D98D42FDFB36C9B04344F10403B7B01FB5A6DABCAE18579D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 339 4079df-407a02 SetFilePointer 340 407a04-407a0b GetLastError 339->340 341 407a17-407a1e 339->341 340->341 342 407a0d-407a12 GetLastError call 401a00 340->342 342->341
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 004079F7
                        • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 00407A04
                        • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 00407A0D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: defdbaeaee52fd8378592d8e1df2825fefcc37b6b084922c88407cc70d7f99af
                        • Instruction ID: 5a93cc86c640878996497c794a337888b8ca0741c1be055e509166b882978377
                        • Opcode Fuzzy Hash: defdbaeaee52fd8378592d8e1df2825fefcc37b6b084922c88407cc70d7f99af
                        • Instruction Fuzzy Hash: B0E04F70E04248AAEF11EBB19942B8E77709F443DDF2046AAF110B61D1C7B89B448B5A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 344 4079e0-407a02 SetFilePointer 345 407a04-407a0b GetLastError 344->345 346 407a17-407a1e 344->346 345->346 347 407a0d-407a12 GetLastError call 401a00 345->347 347->346
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 004079F7
                        • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 00407A04
                        • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,00407AB1,?,?,?,?,00408A23,?,?,?,?,00410024), ref: 00407A0D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 6e292a929d7b7a349750692aff9025c065cf03cc9b908e61f101826ec65ae07b
                        • Instruction ID: 245330dd925ea4509b5e7c035510495c7d206e7c200d59746cbc79928cda3183
                        • Opcode Fuzzy Hash: 6e292a929d7b7a349750692aff9025c065cf03cc9b908e61f101826ec65ae07b
                        • Instruction Fuzzy Hash: C1E04830E04204AAEF11E7F19D4278EB6749F443DDF204569F550B72D1D6B4AB448A5A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 349 407a60-407a82 SetFilePointer 350 407a84-407a8b GetLastError 349->350 351 407a97-407a9e 349->351 350->351 352 407a8d-407a92 GetLastError call 401a00 350->352 352->351
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A77
                        • GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A84
                        • GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 07cd6a8d9b8cb5faa2668acfc30630c36b7e64a8cc22214cc7a95b1919914614
                        • Instruction ID: 6b4ed85d7e974bef2c1e925015df812f68bdc362f0ca1ccbf81028c3b51d5ffe
                        • Opcode Fuzzy Hash: 07cd6a8d9b8cb5faa2668acfc30630c36b7e64a8cc22214cc7a95b1919914614
                        • Instruction Fuzzy Hash: F0E02030E00305A6DB10F7F18C0278EB7745F443DCF204569F500B72C1D674AB408B6A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 354 407a1f-407a40 SetFilePointer 355 407a42-407a49 GetLastError 354->355 356 407a55-407a56 354->356 355->356 357 407a4b-407a50 GetLastError call 401a00 355->357 357->356
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A38
                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A42
                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 5b7cd9ebf3dd27ff56e9364ce5c96ad9bb703705931c61eb94f280662cf5284b
                        • Instruction ID: fd35b0a9dc768952ca237b434d6296c53e47c32f5a9f1e925e23fd8a64cc5e59
                        • Opcode Fuzzy Hash: 5b7cd9ebf3dd27ff56e9364ce5c96ad9bb703705931c61eb94f280662cf5284b
                        • Instruction Fuzzy Hash: 0BE08670E0418469DF01FBB18442BEE73699F843D9F10822FF550A62E1CA78DA04DA66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 359 407a20-407a40 SetFilePointer 360 407a42-407a49 GetLastError 359->360 361 407a55-407a56 359->361 360->361 362 407a4b-407a50 GetLastError call 401a00 360->362 362->361
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A38
                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A42
                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00407AD3,00000000,00000000,?,?,?,?,00408A23,?,?,?), ref: 00407A4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 6f84bb6e31edbf9552a4346de1eca33e592c70b100112371f579285e75737ecd
                        • Instruction ID: d1942c163f719b981ddb72f6eb97984ffa5496c510d770a8cf0cac3d1c9d0163
                        • Opcode Fuzzy Hash: 6f84bb6e31edbf9552a4346de1eca33e592c70b100112371f579285e75737ecd
                        • Instruction Fuzzy Hash: 5EE08030D0414465DF04F7B18902B9EB35D9F843D9F10812EBE51A72D1D974EF10D576
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Console$Output
                        • String ID:
                        • API String ID: 548471156-0
                        • Opcode ID: 6b4eb1a7e2259e80cd7d0360c7a32f8e5feb2907f1867216560be5de9c59f8ba
                        • Instruction ID: 63b62d3b4916cb4612e25429eda8cdfef1f725d022f66c1fe477bd576447a1fa
                        • Opcode Fuzzy Hash: 6b4eb1a7e2259e80cd7d0360c7a32f8e5feb2907f1867216560be5de9c59f8ba
                        • Instruction Fuzzy Hash: C9D0C73550C05314D915397D056917B0640649634C3590937E452B7BE7C43ECD43D57D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A$T!A
                        • API String ID: 0-15907938
                        • Opcode ID: 292cda7ec9135151b3b6dd77965af0d9e308cf08f4f8f203322786e9ebeb7e3f
                        • Instruction ID: 537a991b514a7a411637c80a05f6f8970be7151a9cce04603b5a779ab67996d4
                        • Opcode Fuzzy Hash: 292cda7ec9135151b3b6dd77965af0d9e308cf08f4f8f203322786e9ebeb7e3f
                        • Instruction Fuzzy Hash: C7313E36B041059FCB08EF48CA94699BBB6FB89310B64D0BAE845EB3A4DB74DD419748
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A$T!A
                        • API String ID: 0-15907938
                        • Opcode ID: 846ccc162eaafce1b5c7b1a050a5bbe8048e42328c3b3260f861a31e41650a2f
                        • Instruction ID: 5a22e3289980f31854ad9f6a2900ae2fc9d3380af4e4f8c9223d0b416ba37dd4
                        • Opcode Fuzzy Hash: 846ccc162eaafce1b5c7b1a050a5bbe8048e42328c3b3260f861a31e41650a2f
                        • Instruction Fuzzy Hash: 33215E747041059FCB04EF58CA94AAEBBB6FB89310F24C1BAD485EB3A4DB74DD418B49
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A$T!A
                        • API String ID: 0-15907938
                        • Opcode ID: 91b2f4bd43a75216f69033172efc329aeff19f9ae1c89f8f044faf15de766d15
                        • Instruction ID: 83209f46b418da27666d85b7be8dafb9c5336301bac11fa8be412619dbd17f58
                        • Opcode Fuzzy Hash: 91b2f4bd43a75216f69033172efc329aeff19f9ae1c89f8f044faf15de766d15
                        • Instruction Fuzzy Hash: 781188303041059BC704AE69CB846562261FB56340B26C97F9985EB3E9EABBCC12879D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A$T!A
                        • API String ID: 0-15907938
                        • Opcode ID: 11e49d74bae9fb595091d929df38cc205dc4a4b25d3ae7b8e7f48bef72b0b1ae
                        • Instruction ID: cf58ba8987a2d6dd306c2dd8eb8d71cab9d4201e3a9f4f11a75f47fd369b859c
                        • Opcode Fuzzy Hash: 11e49d74bae9fb595091d929df38cc205dc4a4b25d3ae7b8e7f48bef72b0b1ae
                        • Instruction Fuzzy Hash: F51166302142019AC714AA689F845522661FB96300B35C07FD981EB3AAEFBADD02978D
                        APIs
                        • ReadFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00408929,?,?,00000000,?,004089AB,00010000), ref: 004079C1
                        • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00408929,?,?,00000000,?,004089AB,00010000), ref: 004079CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID:
                        • API String ID: 1948546556-0
                        • Opcode ID: d89bef73ccf4e3f6924322de29a24b4e1860b7089d171f87b6d1b97605b4752f
                        • Instruction ID: da7af6117f41874c62c7a1669c8287f7828eef1a2148bf0f844562f6ac246853
                        • Opcode Fuzzy Hash: d89bef73ccf4e3f6924322de29a24b4e1860b7089d171f87b6d1b97605b4752f
                        • Instruction Fuzzy Hash: E1D05BA194414969FB11B2E14DC2FAF239CCB003CCF14446BF001F21E1D678AD044537
                        APIs
                        • ReadFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00408929,?,?,00000000,?,004089AB,00010000), ref: 004079C1
                        • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00408929,?,?,00000000,?,004089AB,00010000), ref: 004079CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID:
                        • API String ID: 1948546556-0
                        • Opcode ID: 66df20790585931bb73513b2ddcba2e980c1a3b41d4c046dee610babccbd8c9b
                        • Instruction ID: 06fe6c78c315d8db1d4cfd8f83770ce4732eb7cd5c2e16f40b291955f9867e19
                        • Opcode Fuzzy Hash: 66df20790585931bb73513b2ddcba2e980c1a3b41d4c046dee610babccbd8c9b
                        • Instruction Fuzzy Hash: 97D05BA150410879FA10B2D54D82F6F729CCB403CCF104467F502F31D1E578BE004677
                        APIs
                        • GetStdHandle.KERNEL32(000000F6,004122D0), ref: 0040EBC1
                        • GetConsoleMode.KERNEL32(00000000,000000F6,004122D0), ref: 0040EBC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ConsoleHandleMode
                        • String ID:
                        • API String ID: 674689721-0
                        • Opcode ID: cd3f702c6ae7162a5c158dcb37473600b9b14866155cacf5a99d1370c0c14368
                        • Instruction ID: d01af2e4790d39d9c8ff06ea0c37c415c6b76420113165172cc2a06175c1d9fd
                        • Opcode Fuzzy Hash: cd3f702c6ae7162a5c158dcb37473600b9b14866155cacf5a99d1370c0c14368
                        • Instruction Fuzzy Hash: F7D09EB021824461CA24B3BB6C1374B35494B4979CB104A7BF351BBAD3DABDA89441AE
                        APIs
                        • GetConsoleWindow.KERNEL32(00000000,?,0040190C,00000000), ref: 0040EB05
                        • ShowWindow.USER32(00000000,00000000,?,0040190C,00000000), ref: 0040EB0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Window$ConsoleShow
                        • String ID:
                        • API String ID: 3999960783-0
                        • Opcode ID: 3546ca0c6a46a33ec315c261994e86461f4a9c1d2e4363232d98bd33da87ed63
                        • Instruction ID: 59d47fc7e03d55531c401a34f8bc7898160856bd4c7acab0eebf571d9e281308
                        • Opcode Fuzzy Hash: 3546ca0c6a46a33ec315c261994e86461f4a9c1d2e4363232d98bd33da87ed63
                        • Instruction Fuzzy Hash: E5A00150A6831822D84073E75C07B0A758C4B51BEDFC1456AB605B71F258ADE40100BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: KERNEL32.dll$VirtualAlloc
                        • API String ID: 0-810328721
                        • Opcode ID: bf2c03b4c9584e47427b8a83c7fd22f4e2754ddcdc599ab529cf2798eed34d92
                        • Instruction ID: 75042b29090c4b53bc9bf50b9d0ffcb6411e54f5d89e25c384697b2fec81e035
                        • Opcode Fuzzy Hash: bf2c03b4c9584e47427b8a83c7fd22f4e2754ddcdc599ab529cf2798eed34d92
                        • Instruction Fuzzy Hash: 14C1E674D0111CDBDB10EBA5D981BCEB7B9AF44304F20817AE504BB292DB78AE458F95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A
                        • API String ID: 0-708079440
                        • Opcode ID: eff16e1542f0cc91d137ac70790b5f8983f75ea2630e354953e43cbf98a5aeea
                        • Instruction ID: 302bce110964fce41dd41ed17766f4d90b752983e98a2e1ac2cc0ea696bc3044
                        • Opcode Fuzzy Hash: eff16e1542f0cc91d137ac70790b5f8983f75ea2630e354953e43cbf98a5aeea
                        • Instruction Fuzzy Hash: A20192317041019BDB009A5DCA84B1733A9EBD6354F24C07FE844EBB99DABDDC028BA9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A
                        • API String ID: 0-708079440
                        • Opcode ID: 47e7af7f1ffad02378a675a72411c4ae40512ab9ad602a7b604cd8e159969b59
                        • Instruction ID: 7e62bea6987408659dcd782fb03fcc3e2068afdb8154aa6f0d32e87b8a41eb71
                        • Opcode Fuzzy Hash: 47e7af7f1ffad02378a675a72411c4ae40512ab9ad602a7b604cd8e159969b59
                        • Instruction Fuzzy Hash: CEF0F4703141028AD7149F59CB8466227A1FB96310728C4BFD484EBBA8EBBCDC525A59
                        APIs
                        • CloseHandle.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407910
                        • GetLastError.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407919
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: e0adc930e8c4e2d9a41c20ffdc4e37d01c3128ee2547c7c3305408e7836f54bf
                        • Instruction ID: 5ccdd0ee9d5d1066b1b624ad527db39cd39d018819ddbf77ce030343a17e4b2b
                        • Opcode Fuzzy Hash: e0adc930e8c4e2d9a41c20ffdc4e37d01c3128ee2547c7c3305408e7836f54bf
                        • Instruction Fuzzy Hash: F7C012A2A0834012E90132B7298370A228D08183CDB10083BBA42B2AD3B9BDE842002F
                        APIs
                        • CloseHandle.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407910
                        • GetLastError.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407919
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: 0a6064711b861f3747320558a194cc79d713102b693cb56949fe7eb2de6787a4
                        • Instruction ID: 7276877ebf0b267fe8b32ff604c05de6c8c3f8ab5e3dca0a9b8585eef98dc468
                        • Opcode Fuzzy Hash: 0a6064711b861f3747320558a194cc79d713102b693cb56949fe7eb2de6787a4
                        • Instruction Fuzzy Hash: 9AC01262E0C28501EE1233F2298230E024A0D143CDB20487FFA82B2AE3EABCD442442F
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,?,?,00405F25,?,00412E04,00406E93,?,?,00411A94,00405A44,?,00412324,00405A55,00405A6A,00404D2A), ref: 00405D36
                        • HeapFree.KERNEL32(00000000,00000000,?,?,00405F25,?,00412E04,00406E93,?,?,00411A94,00405A44,?,00412324,00405A55,00405A6A), ref: 00405D3C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID:
                        • API String ID: 3859560861-0
                        • Opcode ID: 05fb3351b15b6ebb99bb95c921deb360b35b983578cc6f9bac8edcca0fbbb0ad
                        • Instruction ID: 505050129634389f18417dc208da8291318dde3776baf7838b28e70b168e9cac
                        • Opcode Fuzzy Hash: 05fb3351b15b6ebb99bb95c921deb360b35b983578cc6f9bac8edcca0fbbb0ad
                        • Instruction Fuzzy Hash: 7DB0026055430475D54473E75C07F16755C474D7DDF400465B705B92D258E9E40040BD
                        APIs
                        • GetOEMCP.KERNEL32(?,00000000,?,?,?,?,004085B3,?,?,00410024,0040B03A,?,?,00410024,?,?), ref: 004042DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e9903fa241cdcbf45d6efa84f1ad0f7df8e817dedf154f70b29e0a30ed4da9b7
                        • Instruction ID: 9519fc7252130eec17223dab5632a83dc5d19d325c3910840436dbef39596f1e
                        • Opcode Fuzzy Hash: e9903fa241cdcbf45d6efa84f1ad0f7df8e817dedf154f70b29e0a30ed4da9b7
                        • Instruction Fuzzy Hash: F8217174A1051AABCB10EF99E991ADDB7B5BF94344B10017AF900F7391DB34EE04CB98
                        APIs
                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403CE6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: AllocString
                        • String ID:
                        • API String ID: 2525500382-0
                        • Opcode ID: 9925c4c503c510ee1eb2779112b4bd6bd754c920517c1eaccc12ef6684d53a6e
                        • Instruction ID: b3444296e6208be87a29efb7fa0dfe85bba757a091a99eb36695ff0dc155556d
                        • Opcode Fuzzy Hash: 9925c4c503c510ee1eb2779112b4bd6bd754c920517c1eaccc12ef6684d53a6e
                        • Instruction Fuzzy Hash: 4EF06235904208EBEB10DF99D64568EBBF8AF04309F1044BAA501B72E1D7749F18D74A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Heap$AllocProcess
                        • String ID:
                        • API String ID: 1617791916-0
                        • Opcode ID: d3aad8f48aff824357ad2bb118215ba7bba5d5886ba48263f8e3eb317a6b0e35
                        • Instruction ID: 6e93ad36899b189ab4278ea883cec7f0b1c880fc4419b5a6ac0dc6b55651ace6
                        • Opcode Fuzzy Hash: d3aad8f48aff824357ad2bb118215ba7bba5d5886ba48263f8e3eb317a6b0e35
                        • Instruction Fuzzy Hash: 89C1F570A00616DFCB10DF58C584B9EB7F1BB44314F2586BAD819BB391C378AD55CB98
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d03ab1ee6f7602e5a1e072d449a340237d68da8d1938a374e700fe61f1b0b4dc
                        • Instruction ID: 8775df9561993f597069edc18400ce79bdac22f9468fb616519356ff237ae523
                        • Opcode Fuzzy Hash: d03ab1ee6f7602e5a1e072d449a340237d68da8d1938a374e700fe61f1b0b4dc
                        • Instruction Fuzzy Hash: A93119747002018BDB54DF59C5C0B16F3A2BB84318F1AC6BAD85A9F38AD778DC61CB99
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: AllocString
                        • String ID:
                        • API String ID: 2525500382-0
                        • Opcode ID: a5aaca394ddaf9e59fd4bf8e0d77e5b7a7c215e8e22361c1cd5220a09a034e03
                        • Instruction ID: 1fac494fe0108ba5209ba9b7da2e81bbd88e8378145ed6bae88bb302e276d21e
                        • Opcode Fuzzy Hash: a5aaca394ddaf9e59fd4bf8e0d77e5b7a7c215e8e22361c1cd5220a09a034e03
                        • Instruction Fuzzy Hash: 33213D343005018FD7309E2DC88561ABAD9AF90346B244A7EE5C1EB3D1D778EE4687C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eaaa10141092e500d5d5221eaa506515e077c741c5671faf4fb60e95b2f0b32e
                        • Instruction ID: a14a460e763f615e68002d55429bf8c8d1fead351aa352095c0135814da30cd4
                        • Opcode Fuzzy Hash: eaaa10141092e500d5d5221eaa506515e077c741c5671faf4fb60e95b2f0b32e
                        • Instruction Fuzzy Hash: 943102746042019FC714DF18C580A5AF7E1BF88314F16CA7AE88ADB345D736EC66CB86
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 563449363b83f774cef19cd45647f8cb7fa392c4666dba751e9f7f522fbd3a08
                        • Instruction ID: a6e3b326a1c6d25bb30e9c7df88f5d905138112bcd571670a0434e0d21bbd05c
                        • Opcode Fuzzy Hash: 563449363b83f774cef19cd45647f8cb7fa392c4666dba751e9f7f522fbd3a08
                        • Instruction Fuzzy Hash: FF210E75B01109AFCB00EFA9E881A8EB7B5EF88314F10457AF400F7391DA34ED458B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 98bf60af16d85d2659680352f126eaa54229d42dffaaab6231d806dbc4f271e9
                        • Instruction ID: 4a6f6376e2797145cc002edafb227bed2a7fbaa8bd962f7a0bab70062036b763
                        • Opcode Fuzzy Hash: 98bf60af16d85d2659680352f126eaa54229d42dffaaab6231d806dbc4f271e9
                        • Instruction Fuzzy Hash: 71211531B001054BDB01EBBED881ADFB3B59F88308F14C93AF911F7285DA78D9158BA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d8fe11507c071d66113d4892921d9448c7d4452f5c39a21e853c609788e7f8b0
                        • Instruction ID: 5cce15e7f3442aa715dd3fdcc263d6b267d7a576eb1076c8e23476a5c8191d66
                        • Opcode Fuzzy Hash: d8fe11507c071d66113d4892921d9448c7d4452f5c39a21e853c609788e7f8b0
                        • Instruction Fuzzy Hash: 95215331A0451D8BCB20DA15CD88ACEB3B9EF84344F1041FAD888B3251DBF66AC58F98
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0393ba5d7a704f9fb6686157ffff1f2cd048eead32c368aac8d7d7a3bfe3be26
                        • Instruction ID: 78af17d4a81ea7b822e3c1c27b97bfa2dcb79b5302591ad6601161b5c04d250b
                        • Opcode Fuzzy Hash: 0393ba5d7a704f9fb6686157ffff1f2cd048eead32c368aac8d7d7a3bfe3be26
                        • Instruction Fuzzy Hash: 5A219631E005584BCB20EA55CC45BCEB3A9DFC4314F5145BAD448B3292DAF99EC94F9D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ace37cac569f64f47958e0bf43e37d6d8b77f89b3e9e3da2233dd1d8e3e7a2c
                        • Instruction ID: 85cc146edb12159683ee0fda51d8e73be5a4d4cd057f4c63dbbc164451026aa6
                        • Opcode Fuzzy Hash: 2ace37cac569f64f47958e0bf43e37d6d8b77f89b3e9e3da2233dd1d8e3e7a2c
                        • Instruction Fuzzy Hash: 3321D6747002118BDB58DE59C0C0616F3A2BB94318B1AC6BADD0A9F38AD778DC95CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1e80202ecc7700f7c3b30495920f8eeb6e4cbaab6191ffc8e265a1f519b90203
                        • Instruction ID: d2b2b87ece808d85ccb57624ba7a704e556ff50871c1bc9ef0a87b5dd7fb6c41
                        • Opcode Fuzzy Hash: 1e80202ecc7700f7c3b30495920f8eeb6e4cbaab6191ffc8e265a1f519b90203
                        • Instruction Fuzzy Hash: 7C016272304D0442CA19253D1CBD2BF5245DB61304EB41C3BA106BA7D6E8BEDE075EDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: de341401f95b24afedb0ef8c7525fe9230806e49eaccd0adeae2028ba11f35b0
                        • Instruction ID: cb3d223e77ef97aa0076d5c8407b85c3f0157757ce101467f55fdace500237bd
                        • Opcode Fuzzy Hash: de341401f95b24afedb0ef8c7525fe9230806e49eaccd0adeae2028ba11f35b0
                        • Instruction Fuzzy Hash: 6CF0A076700114ABCB00EA8ED881A8AF3ECEF85354B14407AE604E7385EAB5EE158796
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e31c819c156f354e2b5c7111c16825a531ed05a3dbb542af1af4cde972ae882a
                        • Instruction ID: 0f5bee7f0fcff895cd94cbd8a00942beae6b7f632a729c4815e1ef088582df12
                        • Opcode Fuzzy Hash: e31c819c156f354e2b5c7111c16825a531ed05a3dbb542af1af4cde972ae882a
                        • Instruction Fuzzy Hash: 8CF0EC30210B118FD324DF2AC488B43B3E4EF48324F14CA7AD8999B795C378A980DF95
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: fb93ac02be2b1b4337f020ec637fe9853dce1b70996f550062dd840b2f89bfcd
                        • Instruction ID: 83742cc9d1fbe337d8d26119bb5f2b449748d9f110a3d745227ff247a3a92e36
                        • Opcode Fuzzy Hash: fb93ac02be2b1b4337f020ec637fe9853dce1b70996f550062dd840b2f89bfcd
                        • Instruction Fuzzy Hash: 62E04F76F041186B8700EAAF98C188FEBE9DFC8654B2440BEF108E3351D6749F028B95
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 24b9d5f8d3e75d1dde91d3f34cf7cc5e82a5428f66484c88b21ae2446e93f15d
                        • Instruction ID: 90a92c6413f3f29637d76667a426906c27befd31afbcd37b73ad313521f443e4
                        • Opcode Fuzzy Hash: 24b9d5f8d3e75d1dde91d3f34cf7cc5e82a5428f66484c88b21ae2446e93f15d
                        • Instruction Fuzzy Hash: 9CE01A76F042186B8700EAEE988188FF6E9DBC8654B20407AA609E3301E574AF0147A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5ee3a5548286144fbe5fdee3fa77bc3e965f3408f89213acf64b1e23561ae9d5
                        • Instruction ID: 1e6ebe2897a6df437e3e9270c8c7e57e30e0f5fc0492904f38b99cbbd81d21b5
                        • Opcode Fuzzy Hash: 5ee3a5548286144fbe5fdee3fa77bc3e965f3408f89213acf64b1e23561ae9d5
                        • Instruction Fuzzy Hash: 47E0DF37A00910CFDF316B58D9883A77725FB88312F190173D8087B2A083784C88DE25
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c6b7d6c7375a9ba7e802cf176fa3da395aef285a501539a361749e3c7fdfe4e8
                        • Instruction ID: bc680bc2e3d22c50c98209c25f39290005537375a9083e25ddfde3f2465647fa
                        • Opcode Fuzzy Hash: c6b7d6c7375a9ba7e802cf176fa3da395aef285a501539a361749e3c7fdfe4e8
                        • Instruction Fuzzy Hash: 5AE08C3672031047EB749A1998853DA73D9EFCC3A0F0440BEAE18E7382EA745C1882E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                        • Instruction ID: 5e9915ca36a0f19ff403a26e0f849fb2bb954af63b0ba79f3ac357acf77c8523
                        • Opcode Fuzzy Hash: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                        • Instruction Fuzzy Hash: 8CD05E765002186BD711EB84DC81ECEBBACDB05264F000066AA45A3240D6706A5087E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                        • Instruction ID: b37c337f84b49a801dd6a426d1968b6031f0da05031a260c4b3d575df8412873
                        • Opcode Fuzzy Hash: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                        • Instruction Fuzzy Hash: 34D05E739002186BD711EB84DC81ECEBBACDB05264F000066AA45A3240D6706A4087E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f9f2ff7ee235f739666ece6dde1823432c708401eec46a22e15e1810d1e4efe
                        • Instruction ID: fe8c2afeb31b916a8f6c91382301428841c6e9873b104357e2832b47b1ac2f2b
                        • Opcode Fuzzy Hash: 3f9f2ff7ee235f739666ece6dde1823432c708401eec46a22e15e1810d1e4efe
                        • Instruction Fuzzy Hash: D9C04C70F0520447CB003BB65D8A04D65A47A4C205B50483EF405EA2D6DB7C5465655D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Process$CurrentDeleteFileTerminate
                        • String ID:
                        • API String ID: 97212057-0
                        • Opcode ID: 9aa5231c4069ddf0f8e6749f9db2135d8d156ecf4ca6b51d231797e1092e3445
                        • Instruction ID: 5a835c9050e208856df1849c617f7d9f1516ee3b80af963417dafc8408be97e5
                        • Opcode Fuzzy Hash: 9aa5231c4069ddf0f8e6749f9db2135d8d156ecf4ca6b51d231797e1092e3445
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: cb7bfc8a7dc649c752c6fc5e3c5ef38ac32d7743503b5b276f40f1bfcf767d9f
                        • Instruction ID: b58e52d8031f11e5e94b958762d01e81ffdabd95c6d1aa67c496aea76b6dbb72
                        • Opcode Fuzzy Hash: cb7bfc8a7dc649c752c6fc5e3c5ef38ac32d7743503b5b276f40f1bfcf767d9f
                        • Instruction Fuzzy Hash: 9DD204B4E006098FDB50CFA9C5806AEFBF1BF48310F24852AE859EB755D738A941CF65
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00409790,?,00409606,?,?,?,0040EBEF,00000000,000000F6,004122D0), ref: 00409969
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: a00f64c418f563bb18d6a5d3070a88e93bf5c0917bb006b9e7354b03832a50cf
                        • Instruction ID: ea7781d82f9cf979bc817355ae7624852fc4f9366fe1380c0e96d70bf626fd47
                        • Opcode Fuzzy Hash: a00f64c418f563bb18d6a5d3070a88e93bf5c0917bb006b9e7354b03832a50cf
                        • Instruction Fuzzy Hash: 8DA00271A3430852D944B6AE1847906B2CC8644B8C780447A7D05F3AD399BCFC0440BD
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: LoadResource
                        • String ID:
                        • API String ID: 2466228271-0
                        • Opcode ID: 414f2a01db38a6bbeb3dd7f0fc1593ed21da9f591f41379413bbb2e01049d06d
                        • Instruction ID: e5fc21722ffaab77247f2bc290eec50e9745f3c514c8c1080ae1d8d8a4c83b44
                        • Opcode Fuzzy Hash: 414f2a01db38a6bbeb3dd7f0fc1593ed21da9f591f41379413bbb2e01049d06d
                        • Instruction Fuzzy Hash: 24A0028051430836EB0473A75C07C27759C88C1BDC7404469BD01A259298B9E80400B9
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,004095CD,?,00409637,?,?,?,0040EBEF,00000000,000000F6,004122D0), ref: 00409975
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: b4f911503f562ce8bfee0c82dee351cab6b009e8ee9105b31c6df604582e79df
                        • Instruction ID: b9fadafb755339f5cdfd43450ed1693da78c40443ce3a347d6b658e64fe02145
                        • Opcode Fuzzy Hash: b4f911503f562ce8bfee0c82dee351cab6b009e8ee9105b31c6df604582e79df
                        • Instruction Fuzzy Hash: CCA0022025830822E44472975803B05B58C4741BDDF800065FE05659D218E5E40400BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4bb362dc50aff55a009c9f3f8bfed5a460aaf7a90c2a39229206c2aca3bdbc5f
                        • Instruction ID: 7c5f3e6fcaaa82531bcb688d462b83ea70cab20ab9d4f3366d48a86c3eb791f6
                        • Opcode Fuzzy Hash: 4bb362dc50aff55a009c9f3f8bfed5a460aaf7a90c2a39229206c2aca3bdbc5f
                        • Instruction Fuzzy Hash: D1429A78E01219DFCB48CFA8D58499DFBF2BF49310F29819AE819A7311D634AE46CF54
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79432a5c1fa9295698d4f6493a3990c3461a3a865c20d2cafb07ca92546c02b4
                        • Instruction ID: 69b6c023101ab6af6d478f00f25d56877183e3a074e9d3f8ecfbe320de379e4d
                        • Opcode Fuzzy Hash: 79432a5c1fa9295698d4f6493a3990c3461a3a865c20d2cafb07ca92546c02b4
                        • Instruction Fuzzy Hash: 453148717109018BD368CF2DED8474676E2F7C9305F28C634DD28D76B8DB7998668B88
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f9bc0fb8c9fd7a3752afca36cea641633e75c6d79491dde5fe46bf3cfc75ec6f
                        • Instruction ID: 51aecb4685c331a9551f119deda4a9aa6746b5b0341971f6aec09006be41b86c
                        • Opcode Fuzzy Hash: f9bc0fb8c9fd7a3752afca36cea641633e75c6d79491dde5fe46bf3cfc75ec6f
                        • Instruction Fuzzy Hash: C421A371B002154B8B08DE3ECD8556EB7E3ABC8610F59C63E9959D7388DA74DC0A8786
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dff2d113f78fb67aa6b2157ad8cfab67af45c39c0b5fe6cedd4361ebb4040c68
                        • Instruction ID: fcb37be2b9053c5c97be0943c10ccb64f3f8fc54c31cfb8832a667138bf80f83
                        • Opcode Fuzzy Hash: dff2d113f78fb67aa6b2157ad8cfab67af45c39c0b5fe6cedd4361ebb4040c68
                        • Instruction Fuzzy Hash: A8219431B006154B8B08DE2ECD8956EB7E3AFC8600B58C63E9949E73C4D974DC068786
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b8969b88a5a37d5d0327e82c465d8f437abbf97035d045c8461487df8d96bd29
                        • Instruction ID: adc5d84ee786c770825157a91fcdd96a0457e9ee33ae58bc4838e7040e30d848
                        • Opcode Fuzzy Hash: b8969b88a5a37d5d0327e82c465d8f437abbf97035d045c8461487df8d96bd29
                        • Instruction Fuzzy Hash: 4A312F75B206119BD344CF2DEC8472636E2F7CA316FA6C634D914C72B9EB35E8128B48
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d68d17008b81e5cddc7feaf1176b75debccc4e935c4e6c82cb0a57305e84efa4
                        • Instruction ID: 76966772840a0cccd752103a5c6e228cddc34f570720eaaf13b2aa975c424495
                        • Opcode Fuzzy Hash: d68d17008b81e5cddc7feaf1176b75debccc4e935c4e6c82cb0a57305e84efa4
                        • Instruction Fuzzy Hash: A6217172B042164B8B0CDE7ECD8456EB6D3ABD8600F59C63E9949D73C4DE749C0A8686
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f9e90e14c39510ba96e2014d4e3fee5dadc61a2ffa8e28ee3c25898224cc8fa
                        • Instruction ID: bf84e3d2486403e5cacf73cd4d1c7fb9ebc0684e57a1b33b1d6eb7c4e48dbc21
                        • Opcode Fuzzy Hash: 0f9e90e14c39510ba96e2014d4e3fee5dadc61a2ffa8e28ee3c25898224cc8fa
                        • Instruction Fuzzy Hash: 8B217431B042164BCB0CDE7EC98856EB7D3ABC8600F59C63E9949E73C4DEB09C068686
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                        • Instruction ID: a11abec21cf2a6b3ad86282231a4093d0a1c06dabe3fe07596c54cf317f0a91e
                        • Opcode Fuzzy Hash: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                        • Instruction Fuzzy Hash: BA21F537920B2B878B198664CD40155E391E9FA360B18622FE8D1D7F00FB3CE90A859C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8e07731e79b37af6dd6d747c90961c4ee4046478374dc0f60e2b50aefc0305c3
                        • Instruction ID: 5745ce4df5b83f744ac2a6628b9578e689c392fc8295c5e075840e92da03e064
                        • Opcode Fuzzy Hash: 8e07731e79b37af6dd6d747c90961c4ee4046478374dc0f60e2b50aefc0305c3
                        • Instruction Fuzzy Hash: 772162759182809AE326DB78EB093867FA0B705348F0845BAE850BB7F2C3FC5948C75C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1806053058.0000000025060000.00000040.00001000.00020000.00000000.sdmp, Offset: 25060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_25060000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ef01cf3098ac9ec91c46ae7ef505b1141e3a2333e1e12f979a2ce7f81756612c
                        • Instruction ID: 50aabe3b7879603566ad9f1336fa20792d9615d110248589c775ea126182dc14
                        • Opcode Fuzzy Hash: ef01cf3098ac9ec91c46ae7ef505b1141e3a2333e1e12f979a2ce7f81756612c
                        • Instruction Fuzzy Hash: 21F09BB8A55608EFCB60CF98E990D9CBBF4AB08224F5040A6ED85E7321D270FE41CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                        • Instruction ID: fce37b4c20062d49c9c032156eed594d04358b82bf3b2addc89c66fa8afbe24e
                        • Opcode Fuzzy Hash: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                        • Instruction Fuzzy Hash: 32F0A838A0024AEFCB50DF98C18198CFBF4EB08368F1480A6EC45E7362D234EE40DB41
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408F1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A$`4A
                        • API String ID: 2030045667-3710297658
                        • Opcode ID: 14de9d1132c19b7e546cce687cb19066a69a9ba92a01944b27b3077063a01840
                        • Instruction ID: e86a0c6fa7a121241690e01ffd89154ece4e14214972da3e0e86ea7ee48a122d
                        • Opcode Fuzzy Hash: 14de9d1132c19b7e546cce687cb19066a69a9ba92a01944b27b3077063a01840
                        • Instruction Fuzzy Hash: 91D0A7F014C2489AD3128F195C52B8A2EA4970130DF00412EF144E61F2C3BDC544CB5E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: $#A$4#A$D#A$D#A$D#A
                        • API String ID: 0-4064844497
                        • Opcode ID: 6f1c77a71978c8ccc871b9becfecf860fb2c33d9809f7423e4c4439b78d2b772
                        • Instruction ID: 8356d5f3c59fc6fea53a291599b63750eafda54e496550a3a86b889d9dc6b275
                        • Opcode Fuzzy Hash: 6f1c77a71978c8ccc871b9becfecf860fb2c33d9809f7423e4c4439b78d2b772
                        • Instruction Fuzzy Hash: 63212C743091048BE714EB59DA8065633B2FBD4304B26C07AEA11EB3B5DBBCDC529B5C
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00408BE6
                        • GetCommandLineA.KERNEL32(00000000,?,00000104), ref: 00408C26
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CommandFileLineModuleName
                        • String ID: P"A
                        • API String ID: 2151003578-898941060
                        • Opcode ID: 35da23d1b7bb87967694117195b5dabd9c939e40c2555a7e4e1e90d35dd45cde
                        • Instruction ID: 3abb8309ba2c76cfd8cf7facd4a204add3dd9f2afddb5ddd76b0677523393cc4
                        • Opcode Fuzzy Hash: 35da23d1b7bb87967694117195b5dabd9c939e40c2555a7e4e1e90d35dd45cde
                        • Instruction Fuzzy Hash: 7951C3718082988BEB358F248A457D97BB0AF66304F1445EEC4C5773D1CABD4EC68F69
                        APIs
                        • GetOEMCP.KERNEL32(00000000,00411DF4,00408183,00411DF4,00408F8C,01000000,00408FFC,?,00406F55,?,004072CC), ref: 00408104
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A
                        • API String ID: 0-708079440
                        • Opcode ID: 420ad0b99cb151f5bd78ac899f3b99d9f03fbd58ab9b456c1a6f5f4cf523c4d7
                        • Instruction ID: ad4c0755616e5dc3fac6155ba83b5fac6b9abe348e91ab645402224bf484bb0d
                        • Opcode Fuzzy Hash: 420ad0b99cb151f5bd78ac899f3b99d9f03fbd58ab9b456c1a6f5f4cf523c4d7
                        • Instruction Fuzzy Hash: 18115A392042418ADB14AF29CA842932761FF45344F1580BFD944EF3EADBBDCD46876D
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408EDF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A
                        • API String ID: 2030045667-5200389
                        • Opcode ID: b9ce88a2ef5f618d9a4263982e22797a831ec767dce773d4bf25595878404595
                        • Instruction ID: aa255864c434124c3bdf4a16b5698c26c5d7ff3b0a2b33c8c565909c3a601b05
                        • Opcode Fuzzy Hash: b9ce88a2ef5f618d9a4263982e22797a831ec767dce773d4bf25595878404595
                        • Instruction Fuzzy Hash: 190129B06042099BDB01CF18D984B9637A4F70935DF04457AE940EB2A6C7B8DE418BDC
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408F1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A
                        • API String ID: 2030045667-5200389
                        • Opcode ID: 7ea7c9c4fd29e8f859c233449e1fa6fc2d4f3a64a635f0056eb6cffdd02a69bb
                        • Instruction ID: c1f9d6343d62856f58ae577abec32887a72f99c848b6314de43a4e42d39388fb
                        • Opcode Fuzzy Hash: 7ea7c9c4fd29e8f859c233449e1fa6fc2d4f3a64a635f0056eb6cffdd02a69bb
                        • Instruction Fuzzy Hash: 84D0C9F0208208AAE3019F0D9D16B9236ECE30474EF008139B604EA2F1C7FDD984CBAD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$5$9$gfff
                        • API String ID: 0-3360872114
                        • Opcode ID: 4878ee2250c0b4a47912d033d150c5a4d2d40273d8b856ddbfc17c32ad2e3656
                        • Instruction ID: 2815887f52a1319e176e1cbc50bf411b07d4f7306dad6e772ab9ea218ba2a1f6
                        • Opcode Fuzzy Hash: 4878ee2250c0b4a47912d033d150c5a4d2d40273d8b856ddbfc17c32ad2e3656
                        • Instruction Fuzzy Hash: D6A11339D042598FDF10CE59C884BEEBBF2FF59314F24416AD801A7381D3799985CB99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$5$9$gfff
                        • API String ID: 0-3360872114
                        • Opcode ID: 9da7279249ae2bd057529f96e3892ea9fd55d7d69daa126608f74bff9c2488cb
                        • Instruction ID: bb1c1bda61303d0f1924bc92f142dd7cf54cb4a92806b8d7acc6b7c01c4aa155
                        • Opcode Fuzzy Hash: 9da7279249ae2bd057529f96e3892ea9fd55d7d69daa126608f74bff9c2488cb
                        • Instruction Fuzzy Hash: 27510539E082598FDF15CE9AC4847EDBBE2BF55304F24016BC80263341E379A9C9CB59
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$d!A$t!A$t!A
                        • API String ID: 0-1285458527
                        • Opcode ID: 8296f799b7c1c1bb5204a28847543c038279424f0a3bc5bfd1c974a12effb040
                        • Instruction ID: 3272c78119fde31ba61db5915ea466dcb70a189a3c5fd81667c22080b75677f5
                        • Opcode Fuzzy Hash: 8296f799b7c1c1bb5204a28847543c038279424f0a3bc5bfd1c974a12effb040
                        • Instruction Fuzzy Hash: C111F1303042029FC714EF69EE8465A3672FB95304B26C03AE202EB3A5DBB99D65D75D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: @A$0BA$@AA$yE
                        • API String ID: 0-2065117078
                        • Opcode ID: 752bffab022b654ac51d501fcf36320d99cc16baaff552b357edb7def6b199c4
                        • Instruction ID: 9aa920ede68c9fe9d6a24a0633dc73afbd7c3424fc93cd754f41cea2312b35a9
                        • Opcode Fuzzy Hash: 752bffab022b654ac51d501fcf36320d99cc16baaff552b357edb7def6b199c4
                        • Instruction Fuzzy Hash: C211E8B5A117119BD750DF2DF8506463BF0FB98306B92817BE508C7362E339E8828B8D
                        APIs
                        • GetLastError.KERNEL32 ref: 00407298
                        • TlsGetValue.KERNEL32 ref: 004072A5
                        • SetLastError.KERNEL32(00000000), ref: 004072CD
                          • Part of subcall function 004071F0: GetLastError.KERNEL32 ref: 004071F5
                          • Part of subcall function 004071F0: TlsGetValue.KERNEL32 ref: 00407214
                          • Part of subcall function 004071F0: LocalAlloc.KERNEL32(00000040), ref: 00407227
                          • Part of subcall function 004071F0: TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                          • Part of subcall function 004071F0: SetLastError.KERNEL32(00000000), ref: 00407248
                        • TlsGetValue.KERNEL32 ref: 004072BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1775790788.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1775768975.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776160076.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776258175.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776282266.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1776296495.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: dd92b19ce766162527e9959a245349ef022e75d0bb409aee249a11b914bf88ca
                        • Instruction ID: 9d49c6f41842307f1f9122737a7ba5ba1dab870b88c8a4fdf82e85b120351550
                        • Opcode Fuzzy Hash: dd92b19ce766162527e9959a245349ef022e75d0bb409aee249a11b914bf88ca
                        • Instruction Fuzzy Hash: 41E04F3220451527C612777A9C42B5B669DDB993EC701043BF544F72AAEE39EC0446AE
                        APIs
                        • FindFirstFileA.KERNEL32(?,?,00410024,?,0040192E,00000000), ref: 0040AFDC
                        • FindClose.KERNEL32(00000000,?,?,00410024,?,0040192E,00000000), ref: 0040AFE8
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 264355e3e8b815cdf9856663946e8b1257f5a1820ae23b1aa361fd361f66df6e
                        • Instruction ID: 182c4f449604cd8701b2f6086798223e659f71b34f18cd9cbeb3da7b431b610d
                        • Opcode Fuzzy Hash: 264355e3e8b815cdf9856663946e8b1257f5a1820ae23b1aa361fd361f66df6e
                        • Instruction Fuzzy Hash: 34D0A7B244020613CB2225BA1C429CF725C5B4435CF004AABF626F31E1F578DAA1566A
                        APIs
                        • GetStartupInfoA.KERNEL32(00412260), ref: 004099AA
                        • GetModuleHandleA.KERNEL32(00000000), ref: 004099BA
                        • GetCurrentProcessId.KERNEL32 ref: 00409A8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CurrentHandleInfoModuleProcessStartup
                        • String ID: T!A$`"A$d!A$t!A$t!A
                        • API String ID: 4098904731-1730669794
                        • Opcode ID: 375731fd3a348e47719edc4832d73a6053ada0a31575ebed95e0f35fca7b0b06
                        • Instruction ID: 24e5537fc4617142d7940d560acc731aabe64a9e39779d968f32d669ac1cad7c
                        • Opcode Fuzzy Hash: 375731fd3a348e47719edc4832d73a6053ada0a31575ebed95e0f35fca7b0b06
                        • Instruction Fuzzy Hash: FB2139B07042409FC700FBA9EA4175A32A1FB85304B20C17EE540EB3A6EBBC9D519B5D
                        APIs
                        • GetLastError.KERNEL32 ref: 004071F5
                        • TlsGetValue.KERNEL32 ref: 00407214
                        • LocalAlloc.KERNEL32(00000040), ref: 00407227
                        • TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                        • SetLastError.KERNEL32(00000000), ref: 00407248
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: f9f260e169530cd1e8a645bc3d8cdfa4aa173e230d5899aae331620e9e485a93
                        • Instruction ID: 79aa1d04de2189fcbb2a88b98389bb8232e742d56cdc7f1e9f9aac7ae7530a8b
                        • Opcode Fuzzy Hash: f9f260e169530cd1e8a645bc3d8cdfa4aa173e230d5899aae331620e9e485a93
                        • Instruction Fuzzy Hash: 1DE06C3184052916C63337765C02A5B35589B143ECF40067EFA50BA6F6C67DAC415AEE
                        APIs
                        • GetLastError.KERNEL32 ref: 004071F5
                        • TlsGetValue.KERNEL32 ref: 00407214
                        • LocalAlloc.KERNEL32(00000040), ref: 00407227
                        • TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                        • SetLastError.KERNEL32(00000000), ref: 00407248
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: 2c92e8215e6b271c397db60445afd1c1126fc9a5c01a701e244d35db31d71ccd
                        • Instruction ID: cc8325b4cb0aee0d201a36aa6d6a7c5f81572539e0f924db0b653e8730ffa3e6
                        • Opcode Fuzzy Hash: 2c92e8215e6b271c397db60445afd1c1126fc9a5c01a701e244d35db31d71ccd
                        • Instruction Fuzzy Hash: E3F0A73184052916C73333B66C02A5F25146B143ACB40027EFA50BA6F2C63CA8014A9E
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,00000000), ref: 0040193C
                        • TerminateProcess.KERNEL32(00000000,00000000,00000000), ref: 00401942
                        • DeleteFileA.KERNEL32(00000000,00000000), ref: 00401967
                          • Part of subcall function 0040EB00: GetConsoleWindow.KERNEL32(00000000,?,0040190C,00000000), ref: 0040EB05
                          • Part of subcall function 0040EB00: ShowWindow.USER32(00000000,00000000,?,0040190C,00000000), ref: 0040EB0B
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ProcessWindow$ConsoleCurrentDeleteFileShowTerminate
                        • String ID:
                        • API String ID: 1545351087-0
                        • Opcode ID: 5ea3e453ff86ba547e63a7db7b1de7fcedac67c51d59b170768e7f1972629bc8
                        • Instruction ID: 125de767535d2f655fb1e11050f55bfa4ec1d60831635f95fae4489aaf5df2a8
                        • Opcode Fuzzy Hash: 5ea3e453ff86ba547e63a7db7b1de7fcedac67c51d59b170768e7f1972629bc8
                        • Instruction Fuzzy Hash: 7431E1709001099ADB10FBB2D451ACEB7B8AF44348F50847FB510B76D6EB7C9A898E59
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Console$Output
                        • String ID:
                        • API String ID: 548471156-0
                        • Opcode ID: 6b4eb1a7e2259e80cd7d0360c7a32f8e5feb2907f1867216560be5de9c59f8ba
                        • Instruction ID: 63b62d3b4916cb4612e25429eda8cdfef1f725d022f66c1fe477bd576447a1fa
                        • Opcode Fuzzy Hash: 6b4eb1a7e2259e80cd7d0360c7a32f8e5feb2907f1867216560be5de9c59f8ba
                        • Instruction Fuzzy Hash: C9D0C73550C05314D915397D056917B0640649634C3590937E452B7BE7C43ECD43D57D
                        APIs
                        • K32GetModuleInformation.KERNEL32(00000000,?,0040A81E,?,00410024,00401997,00000000,00000000), ref: 0040A20A
                        • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,?,0040A81E,?,00410024,00401997,00000000,00000000), ref: 0040A228
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: AllocInformationModuleVirtual
                        • String ID:
                        • API String ID: 1746350648-0
                        • Opcode ID: 8d81c92739043826856b443c1545054aaa47275c159952d582c6f6545163e2c0
                        • Instruction ID: 152afcd66e5fc6fbc3a80ca4841ba2d4b1075bb903f7ed1e2e06b7f978a41f51
                        • Opcode Fuzzy Hash: 8d81c92739043826856b443c1545054aaa47275c159952d582c6f6545163e2c0
                        • Instruction Fuzzy Hash: CBF0E2B5A41200AFDB80DFA4C8C9F587BA8FF08300F505195EE05DB29AC6B4D840CF14
                        APIs
                        • K32GetModuleInformation.KERNEL32(00000000,?,0040A81E,?,00410024,00401997,00000000,00000000), ref: 0040A20A
                        • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,?,0040A81E,?,00410024,00401997,00000000,00000000), ref: 0040A228
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: AllocInformationModuleVirtual
                        • String ID:
                        • API String ID: 1746350648-0
                        • Opcode ID: 32354785ddf74842ba83b24f72489a946f558006ce80f43dd389dbf7444b8227
                        • Instruction ID: ee9a52e794afb639bb586eeb67e6fb8b181acc10d3b0c86dac4b908fba4a7fd8
                        • Opcode Fuzzy Hash: 32354785ddf74842ba83b24f72489a946f558006ce80f43dd389dbf7444b8227
                        • Instruction Fuzzy Hash: F5F0E2B5A01200AFDB80DFA4C8C9F59BBA8FF08700F405095EE05DB28AD6B4E840CB15
                        APIs
                        • GetStdHandle.KERNEL32(000000F6,004122D0), ref: 0040EBC1
                        • GetConsoleMode.KERNEL32(00000000,000000F6,004122D0), ref: 0040EBC7
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ConsoleHandleMode
                        • String ID:
                        • API String ID: 674689721-0
                        • Opcode ID: cd3f702c6ae7162a5c158dcb37473600b9b14866155cacf5a99d1370c0c14368
                        • Instruction ID: d01af2e4790d39d9c8ff06ea0c37c415c6b76420113165172cc2a06175c1d9fd
                        • Opcode Fuzzy Hash: cd3f702c6ae7162a5c158dcb37473600b9b14866155cacf5a99d1370c0c14368
                        • Instruction Fuzzy Hash: F7D09EB021824461CA24B3BB6C1374B35494B4979CB104A7BF351BBAD3DABDA89441AE
                        APIs
                        • GetConsoleWindow.KERNEL32(00000000,?,0040190C,00000000), ref: 0040EB05
                        • ShowWindow.USER32(00000000,00000000,?,0040190C,00000000), ref: 0040EB0B
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Window$ConsoleShow
                        • String ID:
                        • API String ID: 3999960783-0
                        • Opcode ID: 3546ca0c6a46a33ec315c261994e86461f4a9c1d2e4363232d98bd33da87ed63
                        • Instruction ID: 59d47fc7e03d55531c401a34f8bc7898160856bd4c7acab0eebf571d9e281308
                        • Opcode Fuzzy Hash: 3546ca0c6a46a33ec315c261994e86461f4a9c1d2e4363232d98bd33da87ed63
                        • Instruction Fuzzy Hash: E5A00150A6831822D84073E75C07B0A758C4B51BEDFC1456AB605B71F258ADE40100BE
                        APIs
                        • GetProcessHeap.KERNEL32(00000000), ref: 00405D16
                        • HeapAlloc.KERNEL32(00000000,00000000), ref: 00405D1C
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Heap$AllocProcess
                        • String ID:
                        • API String ID: 1617791916-0
                        • Opcode ID: 10f4a4ba6531a16ec15440a2eee764e12e1657af5e81f9b6292e6c69fff65db4
                        • Instruction ID: adaa604e1fb5df6027f44fbf860c70f94d50311257def816e168e2630a19bc6c
                        • Opcode Fuzzy Hash: 10f4a4ba6531a16ec15440a2eee764e12e1657af5e81f9b6292e6c69fff65db4
                        • Instruction Fuzzy Hash: 92B0026055430875D54472F75C07F17754C474D7DDF400465B705B91D258E9E800007D
                        APIs
                        • GetNativeSystemInfo.KERNEL32(?,?,?,00410024,?,0040197B,00000000,00000000), ref: 0040A1E1
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: InfoNativeSystem
                        • String ID:
                        • API String ID: 1721193555-0
                        • Opcode ID: 6227e96e8ff19edf8a460dc8bb6b2359f8b21a7d3ae9ee02f9ab365f2ebfe3ea
                        • Instruction ID: e258437075d8c4fade9a23e5260dd3a261e2b8fe73c5000179e6bcba1e608432
                        • Opcode Fuzzy Hash: 6227e96e8ff19edf8a460dc8bb6b2359f8b21a7d3ae9ee02f9ab365f2ebfe3ea
                        • Instruction Fuzzy Hash: AD21B6B49003149FDF05AFB5C88999F7AACEE19215700446AFC05EB24BDA38DD51CAF9
                        APIs
                        • InternetCheckConnectionA.WININET(?,?,00410024), ref: 00405399
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CheckConnectionInternet
                        • String ID:
                        • API String ID: 3847983778-0
                        • Opcode ID: e6fda4728dee722b605267cad0781c935ff2c56d3e7cf7009e74fc87991bd28a
                        • Instruction ID: 671181e3744b67514dc80a46c58a6b93305e3aa21326f1ff0853e88738ef9385
                        • Opcode Fuzzy Hash: e6fda4728dee722b605267cad0781c935ff2c56d3e7cf7009e74fc87991bd28a
                        • Instruction Fuzzy Hash: BE61E4742087028FC314CF19C185A5BB7E1FF88344F14886EE595A73A2D739E949DF96
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408F1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A$`4A
                        • API String ID: 2030045667-3710297658
                        • Opcode ID: 14de9d1132c19b7e546cce687cb19066a69a9ba92a01944b27b3077063a01840
                        • Instruction ID: e86a0c6fa7a121241690e01ffd89154ece4e14214972da3e0e86ea7ee48a122d
                        • Opcode Fuzzy Hash: 14de9d1132c19b7e546cce687cb19066a69a9ba92a01944b27b3077063a01840
                        • Instruction Fuzzy Hash: 91D0A7F014C2489AD3128F195C52B8A2EA4970130DF00412EF144E61F2C3BDC544CB5E
                        APIs
                        • MoveFileA.KERNEL32(00000000,00000000), ref: 004016BC
                        • CopyFileA.KERNEL32(00000000,00000000,000000FF), ref: 00401739
                        • GetCurrentProcess.KERNEL32(00000000,00000000,?,?,00410024,?,0040193A,00000000), ref: 004017D9
                        • TerminateProcess.KERNEL32(00000000,00000000,00000000,?,?,00410024,?,0040193A,00000000), ref: 004017DF
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: FileProcess$CopyCurrentMoveTerminate
                        • String ID:
                        • API String ID: 1606378885-0
                        • Opcode ID: dbfabd70c2e1e5c677dd1a469442e20c866283869a512ea6d08ef2718c9c1afd
                        • Instruction ID: f565ddde79c8a1d5ed21fb69624d6dd4940238b806e7322889341e95c1edabf9
                        • Opcode Fuzzy Hash: dbfabd70c2e1e5c677dd1a469442e20c866283869a512ea6d08ef2718c9c1afd
                        • Instruction Fuzzy Hash: 9151E430A00109ABDB00FBA5D985BCEB7B9AF40348F50443BF410F76E5EB78AE459B58
                        APIs
                        • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407946
                        • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 0040794F
                        • GetConsoleMode.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407967
                        • GetConsoleOutputCP.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,004087F9,?,?,00000000,?,0040887B), ref: 00407972
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Console$ErrorFileLastModeOutputWrite
                        • String ID:
                        • API String ID: 1666348767-0
                        • Opcode ID: c24d398facfc1137c2022cb5bc32fead67017635c1672130c16bbe57c72be3d2
                        • Instruction ID: f809d50ad608efa7b459c8b2bab34e2f28fa3466cc252dc82699dd7388dc9cd3
                        • Opcode Fuzzy Hash: c24d398facfc1137c2022cb5bc32fead67017635c1672130c16bbe57c72be3d2
                        • Instruction Fuzzy Hash: 5B012BF1E191016AF710A5BE8A45EAEF69DCB05344F141077F540F22C6E63CEE00425F
                        APIs
                          • Part of subcall function 00407900: CloseHandle.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407910
                          • Part of subcall function 00407900: GetLastError.KERNEL32(?,00000000,?,00407B28,?,00000001,?,?,0040874C,00000000,?,00410024,?,0040B04A,?), ref: 00407919
                        • CreateFileW.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,0040874C,00000000,?,00410024,?), ref: 00407CD3
                        • GetLastError.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,0040874C,00000000,?,00410024,?), ref: 00407D1C
                          • Part of subcall function 00407A60: SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A77
                          • Part of subcall function 00407A60: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A84
                          • Part of subcall function 00407A60: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00407D01,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 00407A8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLast$File$CloseCreateHandlePointer
                        • String ID: T!A
                        • API String ID: 3997052936-430979995
                        • Opcode ID: abf8f75884ff5c5361147d1988686909145d599803a555bf9b075f185ff56ffd
                        • Instruction ID: e2816ed792d6084e43ad8c237f8fb12c3b16bfbfdd1f40ff2fd2351da7ec3545
                        • Opcode Fuzzy Hash: abf8f75884ff5c5361147d1988686909145d599803a555bf9b075f185ff56ffd
                        • Instruction Fuzzy Hash: F4614D75E0810A8BD711DF54CA847ABB7B2FB84314F248176D504BB798D338BD46CBAA
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00408BE6
                        • GetCommandLineA.KERNEL32(00000000,?,00000104), ref: 00408C26
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: CommandFileLineModuleName
                        • String ID: P"A
                        • API String ID: 2151003578-898941060
                        • Opcode ID: 35da23d1b7bb87967694117195b5dabd9c939e40c2555a7e4e1e90d35dd45cde
                        • Instruction ID: 3abb8309ba2c76cfd8cf7facd4a204add3dd9f2afddb5ddd76b0677523393cc4
                        • Opcode Fuzzy Hash: 35da23d1b7bb87967694117195b5dabd9c939e40c2555a7e4e1e90d35dd45cde
                        • Instruction Fuzzy Hash: 7951C3718082988BEB358F248A457D97BB0AF66304F1445EEC4C5773D1CABD4EC68F69
                        APIs
                        • GetOEMCP.KERNEL32(00000000,00411DF4,00408183,00411DF4,00408F8C,01000000,00408FFC,?,00406F55,?,004072CC), ref: 00408104
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID:
                        • String ID: T!A$T!A
                        • API String ID: 0-708079440
                        • Opcode ID: 420ad0b99cb151f5bd78ac899f3b99d9f03fbd58ab9b456c1a6f5f4cf523c4d7
                        • Instruction ID: ad4c0755616e5dc3fac6155ba83b5fac6b9abe348e91ab645402224bf484bb0d
                        • Opcode Fuzzy Hash: 420ad0b99cb151f5bd78ac899f3b99d9f03fbd58ab9b456c1a6f5f4cf523c4d7
                        • Instruction Fuzzy Hash: 18115A392042418ADB14AF29CA842932761FF45344F1580BFD944EF3EADBBDCD46876D
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408EDF
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A
                        • API String ID: 2030045667-5200389
                        • Opcode ID: b9ce88a2ef5f618d9a4263982e22797a831ec767dce773d4bf25595878404595
                        • Instruction ID: aa255864c434124c3bdf4a16b5698c26c5d7ff3b0a2b33c8c565909c3a601b05
                        • Opcode Fuzzy Hash: b9ce88a2ef5f618d9a4263982e22797a831ec767dce773d4bf25595878404595
                        • Instruction Fuzzy Hash: 190129B06042099BDB01CF18D984B9637A4F70935DF04457AE940EB2A6C7B8DE418BDC
                        APIs
                        • MessageBoxA.USER32(00000000,00413050,Error,00000000), ref: 00408F1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Error$P0A
                        • API String ID: 2030045667-5200389
                        • Opcode ID: 7ea7c9c4fd29e8f859c233449e1fa6fc2d4f3a64a635f0056eb6cffdd02a69bb
                        • Instruction ID: c1f9d6343d62856f58ae577abec32887a72f99c848b6314de43a4e42d39388fb
                        • Opcode Fuzzy Hash: 7ea7c9c4fd29e8f859c233449e1fa6fc2d4f3a64a635f0056eb6cffdd02a69bb
                        • Instruction Fuzzy Hash: 84D0C9F0208208AAE3019F0D9D16B9236ECE30474EF008139B604EA2F1C7FDD984CBAD
                        APIs
                        • GetLastError.KERNEL32 ref: 00407298
                        • TlsGetValue.KERNEL32 ref: 004072A5
                        • SetLastError.KERNEL32(00000000), ref: 004072CD
                          • Part of subcall function 004071F0: GetLastError.KERNEL32 ref: 004071F5
                          • Part of subcall function 004071F0: TlsGetValue.KERNEL32 ref: 00407214
                          • Part of subcall function 004071F0: LocalAlloc.KERNEL32(00000040), ref: 00407227
                          • Part of subcall function 004071F0: TlsSetValue.KERNEL32(00000000,00000040), ref: 00407242
                          • Part of subcall function 004071F0: SetLastError.KERNEL32(00000000), ref: 00407248
                        • TlsGetValue.KERNEL32 ref: 004072BB
                        Memory Dump Source
                        • Source File: 00000002.00000003.1777961941.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000003.1777844235.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777982197.000000000040F000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1777999826.0000000000410000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778014200.0000000000412000.00000040.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000002.00000003.1778030309.0000000000415000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_3_400000_htkeUc1zJ0.jbxd
                        Similarity
                        • API ID: ErrorLastValue$AllocLocal
                        • String ID:
                        • API String ID: 1904213510-0
                        • Opcode ID: dd92b19ce766162527e9959a245349ef022e75d0bb409aee249a11b914bf88ca
                        • Instruction ID: 9d49c6f41842307f1f9122737a7ba5ba1dab870b88c8a4fdf82e85b120351550
                        • Opcode Fuzzy Hash: dd92b19ce766162527e9959a245349ef022e75d0bb409aee249a11b914bf88ca
                        • Instruction Fuzzy Hash: 41E04F3220451527C612777A9C42B5B669DDB993EC701043BF544F72AAEE39EC0446AE